← Zuruck zu CVEs
CVE-2023-47246
CRITICALCISA KEV9.8
Beschreibung
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht11/10/2023
Zuletzt geandert10/31/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerSysAid
ProduktSysAid Server
SchwachstellennameSysAid Server Path Traversal Vulnerability
KEV Aufnahmedatum2023-11-13
Behebungsfrist2023-12-04
Ransomware-NutzungKnown
Betroffene Produkte
sysaid:sysaid
Schwachen (CWE)
CWE-22CWE-22
Referenzen
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification(cve@mitre.org)
https://documentation.sysaid.com/docs/latest-version-installation-files(af854a3a-2127-422b-91ae-364da2661108)
https://documentation.sysaid.com/docs/on-premise-security-enhancements-2023(af854a3a-2127-422b-91ae-364da2661108)
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-47246(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.