Vulnerability Description
Knowage is the professional open source suite for modern business analytics over traditional sources and big data systems. The endpoint `_/knowage/restful-services/dossier/importTemplateFile_` allows authenticated users to download template hosted on the server. However, starting in the 6.x.x branch and prior to version 8.1.8, the application does not sanitize the `_templateName_ `parameter allowing an attacker to use `*../*` in it, and escaping the directory the template are normally placed and download any file from the system. This vulnerability allows a low privileged attacker to exfiltrate sensitive configuration file. This issue has been patched in Knowage version 8.1.8.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eng | Knowage | >= 6.0.0, < 8.1.8 |
Related Weaknesses (CWE)
References
- https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-jw99-hxxjExploit
- https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-jw99-hxxjExploit
FAQ
What is CVE-2023-36819?
CVE-2023-36819 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Knowage is the professional open source suite for modern business analytics over traditional sources and big data systems. The endpoint `_/knowage/restful-services/dossier/importTemplateFile_` allows ...
How severe is CVE-2023-36819?
CVE-2023-36819 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36819?
Check the references section above for vendor advisories and patch information. Affected products include: Eng Knowage.