An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0002.md | Broken Link |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0001.md | Patch Third Party Advisory |
https://www.sysaid.com/it-service-management-software/incident-management | Product |
Configurations
Information
Published : 2022-01-11 12:15
Updated : 2022-01-20 09:08
NVD link : CVE-2021-43972
Mitre link : CVE-2021-43972
JSON object : View
CWE
Products Affected
sysaid
- sysaid