An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for unintended functionality. An attacker can abuse the CreateProcessAutosave() method to inject their own functionality into a development process. If (upon a warning) a user decides to recover unsaved work by using the last saved version, the malicious code could enter the workflow. Should the process action stages not be fully reviewed before publishing, this could result in the malicious code being run in a production environment.
References
Link | Resource |
---|---|
https://blueprism.com | Product |
https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise | Vendor Advisory |
https://portal.blueprism.com/security-vulnerabilities-august-2022 | Permissions Required Vendor Advisory |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
Information
Published : 2022-08-25 23:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-36115
Mitre link : CVE-2022-36115
CVE.ORG link : CVE-2022-36115
JSON object : View
Products Affected
ssctech
- blue_prism
CWE