HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: HCL
Published:
Updated: 2024-08-02T20:29:31.840Z
Reserved: 2023-10-10T21:26:10.163Z
Link: CVE-2023-45722

No data.

Status : Modified
Published: 2024-01-03T03:15:09.200
Modified: 2024-11-21T08:27:15.667
Link: CVE-2023-45722

No data.