Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.
References
Link | Resource |
---|---|
https://github.com/bonitasoft/bonita-web | Product Third Party Advisory |
https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ | Exploit Third Party Advisory |
https://github.com/bonitasoft/bonita-web | Product Third Party Advisory |
https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bonitasoft/bonita-web - Product, Third Party Advisory | |
References | () https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/ - Exploit, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-06-02 14:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25237
Mitre link : CVE-2022-25237
CVE.ORG link : CVE-2022-25237
JSON object : View
Products Affected
bonitasoft
- bonita_web
CWE