Date published: 2017-09-01T13:29:00.213-04:00
Date last modified: 2017-09-13T09:46:05.433-04:00
CVSS Score: 7.2
Principal attack vector: LOCAL
Reference URL: https://github.com/theguly/CVE-2017-14105
Summary: HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifying a backup archive before a restore, because the restore feature does not validate pathnames within the archive. An authenticated, local attacker – even restricted as a tenant – can add a jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will be exposed at the web interface).