CVE-2022-25237

CRITICAL EXPLOITED NUCLEI

Bonitasoft Bonita Web - Remote Code Execution

Title source: rule

Description

Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.

Nuclei Templates (1)

Bonita Web 2021.2 - Authentication/Authorization Bypass
CRITICALVERIFIEDby Sourabh-Sahu
Shodan: http.title:"Bonita" || "Server: Bonita"
FOFA: title="Bonita" || header="Server: Bonita"

Scores

CVSS v3 9.8
EPSS 0.9107
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-05-15
Status published
Products (1)
bonitasoft/bonita_web 2021.2
Published Jun 02, 2022
Tracked Since Feb 18, 2026