cve/2023/CVE-2023-28725.md

19 lines
955 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-28725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28725)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.
### POC
#### Reference
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
#### Github
No PoCs found on GitHub currently.