4 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. • https://www.knime.com/security/advisories • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content. KNIME Server versiones anteriores a 4.12.6 y versiones 4.13.x anteriores a 4.13.4 (cuando se instala en modo desatendido) mantiene la contraseña del administrador en un archivo sin los controles de acceso a archivos apropiados, permitiendo a todos los usuarios locales leer su contenido • https://github.com/dawid-czarnecki/public-vulnerabilities/tree/master/KNIME/CVE-weak-file-permission https://zigrin.com/advisories/knime-server-weak-file-permissions • CWE-522: Insufficiently Protected Credentials •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

KNIME Server before 4.13.4 allows XSS via the old WebPortal login page. KNIME Server versiones anteriores a 4.13.4, permite un ataque de tipo XSS por medio de la antigua página de inicio de sesión de WebPortal • https://docs.knime.com/2021-06/server_update_guide/index.html#_bugfixes https://zigrin.com/advisories/knime-server-dom-based-xss-in-a-login-panel • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

KNIME Server before 4.13.4 allows directory traversal in a request for a client profile. KNIME Server versiones anteriores a 4.13.4, permite una salto de directorio en una petición de un perfil de cliente • https://docs.knime.com/2021-06/server_update_guide/index.html#_bugfixes https://zigrin.com/advisories/knime-server-directory-path-traversal-in-the-profiles-section • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •