CVE-2025-34320
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-20

Last updated on: 2025-11-20

Assigner: VulnCheck

Description
BASIS BBj versions prior to 25.00 contain a Jetty-served web endpoint that fails to properly validate or canonicalize input path segments. This allows unauthenticated directory traversal sequences to cause the server to read arbitrary system files accessible to the account running the service. Retrieved configuration artifacts may contain account credentials used for BBj Enterprise Manager; possession of these credentials enables administrative access and use of legitimate management functionality that can result in execution of system commands under the service account. Depending on the operating system and the privileges of the BBj service account, this issue may also allow access to other sensitive files on the host, including operating system or application data, potentially exposing additional confidential information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-20
Last Modified
2025-11-20
Generated
2026-05-07
AI Q&A
2025-11-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
basis bbj *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in BASIS BBj versions prior to 25.00 where a Jetty-served web endpoint does not properly validate or canonicalize input path segments. This flaw allows unauthenticated attackers to use directory traversal sequences to read arbitrary system files accessible to the service account. Sensitive configuration files containing credentials can be retrieved, potentially granting administrative access and the ability to execute system commands under the service account.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive files and credentials, enabling attackers to gain administrative access to BBj Enterprise Manager. This access can allow execution of system commands with the privileges of the service account, potentially compromising the entire system. Depending on the operating system and service account privileges, attackers may access additional confidential information stored on the host.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart