9.8
CVSSv3

CVE-2022-25237

Published: 02/06/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bonitasoft bonita web 2021.2

Github Repositories

By analyzing a Wireshark scan report, I solved 'Meerkat', a Sherlocks type problem, which is documented in this repository.

Meerkat-Analysis-Report By analyzing a Wireshark scan report, I solved 'Meerkat', a Sherlocks type problem, which is documented in this repository Hare we download the zip file After download we extract file with the given password Task 1 We believe our Business Management Platform server has been compromised Please can you confirm the name of the application run