Bonita Web Authorization Bypass Vulnerability

漏洞信息

漏洞名称: Bonita Web Authorization Bypass Vulnerability

漏洞编号:

  • CVE: CVE-2022-25237

漏洞类型: 权限绕过

漏洞等级: 严重

漏洞描述: Bonita Web是由Bonitasoft开发的一款业务流程管理(BPM)软件,广泛应用于企业级服务中,用于设计、部署和管理业务流程。该软件支持通过Web界面进行交互,是企业数字化转型中的重要工具。CVE-2022-25237漏洞存在于Bonita Web 2021.2版本中,由于RestAPIAuthorizationFilter中的排除模式过于宽泛,导致未认证的用户可以通过在URL后附加;i18ntranslation或/../i18ntranslation/来绕过认证/授权机制,访问特权API端点。这一漏洞的技术根源在于输入验证不严格,未能正确限制对敏感API的访问。攻击者利用此漏洞可以在未认证的情况下执行特权操作,可能导致数据泄露、服务中断或其他恶意活动。由于漏洞允许未授权访问且易于利用,其安全风险被评估为严重级别。

产品厂商: Bonitasoft

产品名称: Bonita Web

影响版本: 2021.2

来源: https://github.com/projectdiscovery/nuclei-templates/issues/12656

类型: projectdiscovery/nuclei-templates:github issues

来源概述

Description:

Bonita Web 2021.2 contains an authentication/authorization bypass caused by an overly broad exclude pattern in RestAPIAuthorizationFilter, letting unauthenticated users access privileged API endpoints, exploit requires appending ;i18ntranslation or /../i18ntranslation/ to URL.

Severity: Critical
POC:

KEV: True

Shodan Query: NA

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.

Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and won’t produce results, so we prioritize creating templates with other protocols unless exceptions are made.

You can check the FAQ for the Nuclei Templates Community Rewards Program here.


Bonita Web Authorization Bypass Vulnerability
http://example.com/2025/07/29/github_1170691005/
作者
lianccc
发布于
2025年7月29日
许可协议