CVE-2023-47246
CRITICAL KEV RANSOMWARE NUCLEISysaid < 23.3.36 - Path Traversal
Title source: ruleDescription
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Exploits (7)
nomisec
WORKING POC
53 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2023-47246-EXP
nomisec
SUSPICIOUS
1 stars
by tucommenceapousser · remote
https://github.com/tucommenceapousser/CVE-2023-47246
Nuclei Templates (1)
SysAid Server - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:1540720428 || http.favicon.hash:"1540720428"
FOFA:
icon_hash="1540720428"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9438
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2023-11-13
VulnCheck KEV
2023-11-08
InTheWild.io
2023-11-09
ENISA EUVD
EUVD-2023-51378
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (1)
sysaid/sysaid
< 23.3.36
Published
Nov 10, 2023
KEV Added
Nov 13, 2023
Tracked Since
Feb 18, 2026