Page 2 of 11 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. • https://www.knime.com/security/advisories • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In KNIME Analytics Platform below 4.6.0, the Windows installer sets improper filesystem permissions. En KNIME Analytics Platform versiones anteriores a 4.6.0, el instalador de Windows establece permisos inapropiados para el sistema de archivos • https://knime.com https://www.knime.com/security/advisories#CVE-2022-31500 • CWE-276: Incorrect Default Permissions •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content. KNIME Server versiones anteriores a 4.12.6 y versiones 4.13.x anteriores a 4.13.4 (cuando se instala en modo desatendido) mantiene la contraseña del administrador en un archivo sin los controles de acceso a archivos apropiados, permitiendo a todos los usuarios locales leer su contenido • https://github.com/dawid-czarnecki/public-vulnerabilities/tree/master/KNIME/CVE-weak-file-permission https://zigrin.com/advisories/knime-server-weak-file-permissions • CWE-522: Insufficiently Protected Credentials •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730. KNIME Analytics Platform versiones anteriores a 4.5.0 es vulnerable a un ataque de tipo XXE (inyección de entidades XML externas) por medio de un archivo de flujo de trabajo (.knwf) diseñado, también se conoce como AP-17730 • https://github.com/dawid-czarnecki/public-vulnerabilities https://www.knime.com/changelog-v45 https://www.knime.com/whats-new-in-knime-45 https://zigrin.com/advisories/knime-analytics-platform-external-xml-entity-injection • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

KNIME Server before 4.13.4 allows XSS via the old WebPortal login page. KNIME Server versiones anteriores a 4.13.4, permite un ataque de tipo XSS por medio de la antigua página de inicio de sesión de WebPortal • https://docs.knime.com/2021-06/server_update_guide/index.html#_bugfixes https://zigrin.com/advisories/knime-server-dom-based-xss-in-a-login-panel • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •