An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md - Broken Link | |
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md - Patch, Third Party Advisory | |
References | () https://www.sysaid.com/it-service-management-software/incident-management - Product |
Information
Published : 2022-01-11 20:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-43972
Mitre link : CVE-2021-43972
CVE.ORG link : CVE-2021-43972
JSON object : View
Products Affected
sysaid
- sysaid
CWE