

A CVSS v3 base score of 7.7 has been calculated.

Chained with CVE-2022-43513, this could allow remote code execution.ĬVE-2022-43514 has been assigned to this vulnerability. This could allow an unauthenticated remote user to execute file operations of files outside of the specified root folder. The affected component does not correctly validate the root path for folder related operations, allowing modification of files and folders outside the intended root directory. the CVSS vector string is ( CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L) 3.2.2 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A CVSS v3 base score of 8.2 has been calculated. This could allow an unauthenticated remote attacker to rename and move files as a SYSTEM user.ĬVE-2022-43513 has been assigned to this vulnerability.

The affected components allow the renaming of license files with user input without authentication.
