CVE-2025-37095
Hewlett Packard Enterprise StoreOnce VSA getServerPayload Directory Traversal Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the implementation of the getServerPayload method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root.
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-04-16 CVE Reserved
- 2025-06-02 CVE Published
- 2025-06-02 CVE Updated
- 2025-06-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hewlett Packard Enterprise (HPE) Search vendor "Hewlett Packard Enterprise (HPE)" | HPE StoreOnce Software Search vendor "Hewlett Packard Enterprise (HPE)" for product "HPE StoreOnce Software" | < 4.3.11 Search vendor "Hewlett Packard Enterprise (HPE)" for product "HPE StoreOnce Software" and version " < 4.3.11" | en |
Affected
|