CVE-2023-47246

CRITICAL KEV RANSOMWARE NUCLEI

Sysaid < 23.3.36 - Path Traversal

Title source: rule

Description

In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.

Exploits (7)

nomisec WORKING POC 53 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2023-47246-EXP
nomisec SUSPICIOUS 1 stars
by tucommenceapousser · remote
https://github.com/tucommenceapousser/CVE-2023-47246
gitlab WORKING POC
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2023-47246-EXP
gitlab SUSPICIOUS
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2023-47246

Nuclei Templates (1)

SysAid Server - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:1540720428 || http.favicon.hash:"1540720428"
FOFA: icon_hash="1540720428"

Scores

CVSS v3 9.8
EPSS 0.9438
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-11-13
VulnCheck KEV 2023-11-08
InTheWild.io 2023-11-09
ENISA EUVD EUVD-2023-51378
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (1)
sysaid/sysaid < 23.3.36
Published Nov 10, 2023
KEV Added Nov 13, 2023
Tracked Since Feb 18, 2026