Description
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Product(s):
- sysaid sysaid *
- Sysaid Sysaid - On-premises Edition
- Sysaid Sysaid 21.4.45 On-premises Edition
- Sysaid Sysaid 22.1.64 On-premises Edition
- SysAid 22.1.65 On-Premises Edition
- SysAid 22.3.35 On-Premises Edition
- SysAid 22.4.45 On-Premises Edition
- SysAid 23.2.14 On-Premises Edition
- SysAid 23.2.15 On-Premises Edition
- SysAid 23.3.34 On-Premises Edition
- SysAid 23.3.35 On-Premises Edition
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2023-47246, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2023-47246 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Path-Traversal
- https://capec.mitre.org/data/definitions/126.html
- https://capec.mitre.org/data/definitions/64.html
- https://capec.mitre.org/data/definitions/76.html
- https://capec.mitre.org/data/definitions/78.html
- https://capec.mitre.org/data/definitions/79.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-47246