CVE-2022-25237
CRITICAL EXPLOITED NUCLEIBonitasoft Bonita Web - Remote Code Execution
Title source: ruleDescription
Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.
Nuclei Templates (1)
Bonita Web 2021.2 - Authentication/Authorization Bypass
CRITICALVERIFIEDby Sourabh-Sahu
Shodan:
http.title:"Bonita" || "Server: Bonita"
FOFA:
title="Bonita" || header="Server: Bonita"
Scores
CVSS v3
9.8
EPSS
0.9107
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-05-15
Status
published
Products (1)
bonitasoft/bonita_web
2021.2
Published
Jun 02, 2022
Tracked Since
Feb 18, 2026