First published: Wed Jul 20 2022(Updated: )
Digiwin BPM has inadequate filtering for URL parameter. An unauthenticated remote attacker can perform Blind SSRF attack to discover internal network topology base on URL error response.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Digiwin Business Process Management | <5.8.8.1 |
Update version to 5.8.8.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32457 is identified as a high severity vulnerability due to its potential for remote exploitation.
To mitigate CVE-2022-32457, upgrade Digiwin BPM to version 5.8.8.1 or later.
CVE-2022-32457 allows unauthenticated remote attackers to perform Blind SSRF attacks.
CVE-2022-32457 affects Digiwin Business Process Management software versions prior to 5.8.8.1.
Attackers can potentially discover the internal network topology through URL error responses when exploiting CVE-2022-32457.