Vulnerability Description
An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is a Path Traversal for an Unzip operation. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. During the unzip operation, the code takes file paths from the ZIP archive and writes them to a Vocera temporary directory. Unfortunately, the code does not properly check if the file paths include directory traversal payloads that would escape the intended destination.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vocera | Report Server | >= 5.0.0, <= 5.8.0.135 |
| Vocera | Voice Server | >= 5.0.0, <= 5.8.0.135 |
Related Weaknesses (CWE)
References
- https://www.stryker.com/us/en/about/governance/cyber-security/product-security/Not Applicable
- https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vThird Party Advisory
- https://www.stryker.com/us/en/about/governance/cyber-security/product-security/Not Applicable
- https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vThird Party Advisory
FAQ
What is CVE-2022-46902?
CVE-2022-46902 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is a Path Traversal for an Unzip operation. The Vocera Report Console contains a websocket function that allows ...
How severe is CVE-2022-46902?
CVE-2022-46902 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46902?
Check the references section above for vendor advisories and patch information. Affected products include: Vocera Report Server, Vocera Voice Server.