Vulnerability Description
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for unintended functionality. An attacker can abuse the CreateProcessAutosave() method to inject their own functionality into a development process. If (upon a warning) a user decides to recover unsaved work by using the last saved version, the malicious code could enter the workflow. Should the process action stages not be fully reviewed before publishing, this could result in the malicious code being run in a production environment.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ssctech | Blue Prism | >= 6.4, < 7.1 |
References
- https://blueprism.comProduct
- https://community.blueprism.com/discussion/security-vulnerability-notification-sVendor Advisory
- https://portal.blueprism.com/security-vulnerabilities-august-2022Permissions RequiredVendor Advisory
- https://blueprism.comProduct
- https://community.blueprism.com/discussion/security-vulnerability-notification-sVendor Advisory
- https://portal.blueprism.com/security-vulnerabilities-august-2022Permissions RequiredVendor Advisory
FAQ
What is CVE-2022-36115?
CVE-2022-36115 is a vulnerability with a CVSS score of 7.1 (HIGH). An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse en...
How severe is CVE-2022-36115?
CVE-2022-36115 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36115?
Check the references section above for vendor advisories and patch information. Affected products include: Ssctech Blue Prism.