A directory traversal vulnerability in Safe Software FME Server before 2022.2.5 allows an attacker to bypass validation when editing a network-based resource connection, resulting in the unauthorized reading and writing of arbitrary files. Successful exploitation requires an attacker to have access to a user account with write privileges. FME Flow 2023.0 is also a fixed version.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://community.safe.com/s/ | product |
https://downloads.safe.com/fme/2023/whatsnew_server_2023_0_0_3.txt | release notes |
https://community.safe.com/s/article/Known-Issue-FME-Flow-Directory-Traversal-Vulnerability | mitigation vendor advisory |