// For flags

CVE-2023-38702

Knowage Server vulnerable to path traversal via upload functionality

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.

Knowage es una suite de análisis e inteligencia de negocio de código abierto. A partir de la rama 6.x.x y antes de la versión 8.1.8, el endpoint `/knowage/restful-services/dossier/importTemplateFile` permite a los usuarios autenticados subir `template file` al servidor, pero no necesita ninguna autorización para ser alcanzado. Cuando se carga el archivo JSP, el atacante sólo necesita conectarse a `/knowageqbeengine/foo.jsp` para obtener la ejecución de código en el servidor. Aprovechando esta vulnerabilidad, un atacante con privilegios bajos puede cargar un archivo JSP en el directorio `knowageqbeengine` y obtener la capacidad de ejecutar código en el servidor. Este problema ha sido parcheado en la versión 8.1.8 de Knowage.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-07-24 CVE Reserved
  • 2023-08-04 CVE Published
  • 2024-10-08 CVE Updated
  • 2024-10-08 First Exploit
  • 2025-04-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eng
Search vendor "Eng"
Knowage
Search vendor "Eng" for product "Knowage"
>= 6.1.0 < 8.1.8
Search vendor "Eng" for product "Knowage" and version " >= 6.1.0 < 8.1.8"
-
Affected