CVE-2022-25237 Scanner

CVE-2022-25237 Scanner - Authentication/Authorization Bypass vulnerability in Bonita Web

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

26 days

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Bonita Web is a popular open-source workflow and BPM (Business Process Management) platform developed by Bonitasoft. Organizations around the world utilize it to streamline workflows, automate processes, and manage complex business operations efficiently. The platform allows users to create and customize business applications easily through its intuitive graphical interface. Businesses from various industries employ Bonita Web to improve productivity and operational effectiveness. Its modular design and support for various extensions make it a versatile tool for digital transformation initiatives. As a widely-used solution, maintaining its security is vital to protect sensitive business operations and data.

The Authentication/Authorization Bypass vulnerability identified in Bonita Web 2021.2 poses significant risks by allowing attackers to perform unauthorized actions. This issue is due to inappropriate exclude patterns within the RestAPIAuthorizationFilter. It allows unauthenticated users to bypass security measures and gain access to privileged API endpoints. Attackers can exploit this vulnerability by appending specific patterns to the URL endpoints. Exploitation can lead to unauthorized data access and potential system manipulation.

Technical analysis of the vulnerability indicates that attackers can target specific API endpoints by leveraging URL patterns such as ;i18ntranslation or /../i18ntranslation/. Additionally, the affected endpoints may allow the upload of files, broadening the impact of the vulnerability. The issue is critically heightened by the ease of exploitation, as attackers do not require prior authentication or specialized knowledge.

If exploited by malicious individuals, this vulnerability could facilitate unauthorized access to critical system components, potentially leading to data breaches. Attackers might manipulate internal functionalities or upload malicious files, compromising the system's integrity. The ease of exploitation by bypassing authentication checks poses significant security risks, jeopardizing confidential data and sensitive business processes.

REFERENCES

Get started to protecting your digital assets