24 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2022-46898",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-25T20:15:12.887",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Path Traversal via the \"restore SQL data\" filename. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. The filename provided is not properly sanitized and allows for the inclusion of a path-traversal payload that can be used to escape the intended Vocera restoration directory. An attacker could exploit this vulnerability to point to a crafted ZIP archive that contains SQL commands that could be executed against the database."
}
],
"metrics": {},
"references": [
{
"url": "https://www.stryker.com/us/en/about/governance/cyber-security/product-security/",
"source": "cve@mitre.org"
},
{
"url": "https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities--cve-2022-46898--cve-2022-4.html",
"source": "cve@mitre.org"
}
]
}