HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
References
Link | Resource |
---|---|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: HCL
Published: 2024-01-03T02:59:05.745Z
Updated: 2024-01-03T02:59:05.745Z
Reserved: 2023-10-10T21:26:10.163Z
Link: CVE-2023-45722
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-03T03:15:09.200
Modified: 2024-01-09T19:41:37.487
Link: CVE-2023-45722
JSON object: View
Redhat Information
No data.
CWE