An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Path Traversal via the “restore SQL data” filename. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. The filename provided is not properly sanitized and allows for the inclusion of a path-traversal payload that can be used to escape the intended Vocera restoration directory. An attacker could exploit this vulnerability to point to a crafted ZIP archive that contains SQL commands that could be executed against the database..This CVE has a CVSS3.1 score of 8.1 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2022-46898 |
CVE State | PUBLISHED |
BaseScore | NA |
BaseSeverity | NA |
VectorString | NA |
Version | NA |
References for CVE-2022-46898 :
https://www.stryker.com/us/en/about/governance/cyber-security/product-security/
https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities–cve-2022-46898–cve-2022-4.html
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NA |
AttackComplexity(AC) | NA |
PrivilegesRequired(PR) | NA |
UserInteraction(UI) | NA |
Scope(S) | NA |
Confidentiality(C) | NA |
Availability(A) | NA |
Integrity(I) | NA |