An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | Broken Link |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | Patch Third Party Advisory |
https://www.sysaid.com/it-service-management-software/incident-management | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-01-11T19:19:23
Updated: 2022-01-11T19:19:23
Reserved: 2021-11-17T00:00:00
Link: CVE-2021-43972
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-11T20:15:07.620
Modified: 2022-01-20T17:08:04.130
Link: CVE-2021-43972
JSON object: View
Redhat Information
No data.
CWE