cve/2022/CVE-2022-36116.md

18 lines
1010 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-36116](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36116)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the setValidationInfo administrative function. Removing the validation applied to newly designed processes increases the chance of successfully hiding malicious code that could be executed in a production environment.
### POC
#### Reference
- https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
#### Github
No PoCs found on GitHub currently.