// For flags

CVE-2023-47246

SysAid Server Path Traversal Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.

En SysAid On-Premise anterior al 23.3.36, una vulnerabilidad de path traversal conduce a la ejecución de código después de que un atacante escribe un archivo en la raíz web de Tomcat, tal como se explotó en noviembre de 2023.

SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-11-04 CVE Reserved
  • 2023-11-10 CVE Published
  • 2023-11-13 Exploited in Wild
  • 2023-11-23 First Exploit
  • 2023-12-04 KEV Due Date
  • 2024-08-02 CVE Updated
  • 2024-10-10 EPSS Updated
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sysaid
Search vendor "Sysaid"
Sysaid On-premises
Search vendor "Sysaid" for product "Sysaid On-premises"
< 23.3.36
Search vendor "Sysaid" for product "Sysaid On-premises" and version " < 23.3.36"
-
Affected