Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 and above through 4.0.0; WSO2 Identity Server 5.2.0 and above through 5.11.0; WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0; WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0; and WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Apache(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
JenneferCarmal1 | https://twitter.com/JenneferCarmal1/status/1645543299992768... | Source JenneferCarmal1 1645543302458929152 | 2023/04/11 |
moon_berniece | https://twitter.com/moon_berniece/status/164561909213548544... | Source moon_berniece 1645619094400520192 | 2023/04/11 |
ipssignatures | https://twitter.com/rojinroykolady/status/1648356850134286339 | Source ipssignatures 1648418126495899648 | 2023/04/19 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
cvetrends.com | 55 |
cyberiqs.com | 41 |
lists.astaro.com | 27 |
opsmtrs.com | 11 |
www.vulnmachines.com | 9 |
www.trendmicro.com | 7 |
www.rapid7.com | 6 |
github.com | 5 |
twitter.com | 4 |
www.cisa.gov | 3 |
docs.wso2.com | 3 |
cert-agid.gov.it | 3 |
blog.assetnote.io | 3 |
research.trendmicro.com | 3 |
ipssignatures.appspot.com | 3 |
User | URL | Info Source |
---|---|---|
JenneferCarmal1 | twitter.com | Show Tweet |
moon_berniece | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
Name | URL |
---|---|
hakivvi/CVE-2022-29464 | https://github.com/hakivvi/CVE-2022-29464 |
oppsec/WSOB | https://github.com/oppsec/WSOB |
h3v0x/CVE-2022-29464 | https://github.com/h3v0x/CVE-2022-29464 |
Chocapikk/CVE-2022-29464 | https://github.com/Chocapikk/CVE-2022-29464 |
Inplex-sys/CVE-2022-29464-loader | https://github.com/Inplex-sys/CVE-2022-29464-loader |
mr-r3bot/WSO2-CVE-2022-29464 | https://github.com/mr-r3bot/WSO2-CVE-2022-29464 |
LinJacck/CVE-2022-29464 | https://github.com/LinJacck/CVE-2022-29464 |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | https://github.com/Anonymous-ghost/AttackWebFrameworkTools-5.0 |
0xAgun/CVE-2022-29464 | https://github.com/0xAgun/CVE-2022-29464 |
lowkey0808/cve-2022-29464 | https://github.com/lowkey0808/cve-2022-29464 |
Name | URL |
---|---|
hakivvi/CVE-2022-29464 | github.com |
oppsec/WSOB | github.com |
h3v0x/CVE-2022-29464 | github.com |
Chocapikk/CVE-2022-29464 | github.com |
Inplex-sys/CVE-2022-29464-loader | github.com |
mr-r3bot/WSO2-CVE-2022-29464 | github.com |
LinJacck/CVE-2022-29464 | github.com |
Anonymous-ghost/AttackWebFrameworkTools-5.0 | github.com |
0xAgun/CVE-2022-29464 | github.com |
lowkey0808/cve-2022-29464 | github.com |