Home

Description

BASIS BBj versions prior to 25.00 contain a Jetty-served web endpoint that fails to properly validate or canonicalize input path segments. This allows unauthenticated directory traversal sequences to cause the server to read arbitrary system files accessible to the account running the service. Retrieved configuration artifacts may contain account credentials used for BBj Enterprise Manager; possession of these credentials enables administrative access and use of legitimate management functionality that can result in execution of system commands under the service account. Depending on the operating system and the privileges of the BBj service account, this issue may also allow access to other sensitive files on the host, including operating system or application data, potentially exposing additional confidential information.

PUBLISHED Reserved 2025-04-15 | Published 2025-11-20 | Updated 2025-11-20 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 25.00
affected

Credits

Victor A. Morales, Senior Pentester Team Leader, GMSecTec Inc. finder

Omar Crespo, Pentester, GMSecTec Inc. finder

References

myemail.constantcontact.com/...1103463119019&aid=WbfWkReLRVE vendor-advisory patch

www.vulncheck.com/...unauthenticated-arbitrary-file-read-rce third-party-advisory

cve.org (CVE-2025-34320)

nvd.nist.gov (CVE-2025-34320)

Download JSON