An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | Broken Link |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | Patch Third Party Advisory |
https://www.sysaid.com/it-service-management-software/incident-management | Product |
Configurations
History
No history.
Information
Published : 2022-01-11 20:15
Updated : 2022-01-20 17:08
NVD link : CVE-2021-43972
Mitre link : CVE-2021-43972
CVE.ORG link : CVE-2021-43972
JSON object : View
Products Affected
sysaid
- sysaid
CWE