// For flags

CVE-2022-25371

Unauth Path Traversal with file corruption affecting the Birt plugin of Apache OFBiz

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC (-)
Risk
CVSS Score
9.8 Critical
SSVC
Attend
KEV
-
EPSS
2.1%
Affected Products (-)
Vendors (1)
apache
Products (1)
ofbiz
Versions (1)
< 18.12.06
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (4)
General (1)
openwall
Exploits & POcs (-)
Patches (3)
openwall, apache
Advisories (-)
Summary
Descriptions

Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier.

Apache OFBiz usa el plugin del proyecto Birt (https://eclipse.github.io/birt-website/) para crear visualizaciones de datos e informes. Aprovechando un bug en Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) es posible llevar a cabo un ataque de ejecución de código remota (RCE) en Apache OFBiz, versiones 18.12.05 y anteriores

*Credits: Nikita Podotykin from Positive Technologies <npodotykin@ptsecurity.com>, Positive Technologies zeroday <zeroday@ptsecurity.com>
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2022-02-20 CVE Reserved
  • 2022-09-02 CVE Published
  • 2024-11-20 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Ofbiz
Search vendor "Apache" for product "Ofbiz"
< 18.12.06
Search vendor "Apache" for product "Ofbiz" and version " < 18.12.06"
-
Affected