Vulnerability Description
Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eng | Knowage | >= 6.1.0, < 8.1.8 |
Related Weaknesses (CWE)
References
- https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3ExploitThird Party Advisory
- https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3ExploitThird Party Advisory
FAQ
What is CVE-2023-38702?
CVE-2023-38702 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows...
How severe is CVE-2023-38702?
CVE-2023-38702 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-38702?
Check the references section above for vendor advisories and patch information. Affected products include: Eng Knowage.