{"vulnerability": "CVE-2022-3903", "sightings": [{"uuid": "c4bab1c3-30ff-4b73-b4d5-406d2fa1c51f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39037", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39037\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Agentflow BPM file download function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.\n\ud83d\udccf Published: 2022-11-10T02:20:45.381Z\n\ud83d\udccf Modified: 2025-05-01T14:00:05.111Z\n\ud83d\udd17 References:\n1. https://www.flowring.com/2022/09/19/%e7%94%a2%e5%93%81%e6%9b%b4%e6%96%b0agentflow-v4-0%e3%80%81v3-7%e5%a4%be%e6%aa%94%e5%8a%9f%e8%83%bd%e8%b3%87%e5%ae%89%e4%bf%ae%e6%ad%a3/\n2. https://www.twcert.org.tw/tw/cp-132-6683-57b71-1.html", "creation_timestamp": "2025-05-01T14:15:23.000000Z"}, {"uuid": "0638e2a9-15d3-4915-90d1-324f5f10c4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39039", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11255", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39039\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: aEnrich\u2019s a+HRD has inadequate filtering for specific URL parameter. An unauthenticated remote attacker can exploit this vulnerability to send arbitrary HTTP(s) request to launch Server-Side Request Forgery (SSRF) attack, to perform arbitrary system command or disrupt service.\n\ud83d\udccf Published: 2023-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T15:34:48.454Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6792-c4a62-1.html", "creation_timestamp": "2025-04-10T15:48:57.000000Z"}, {"uuid": "232e1d80-96ec-4ada-b66a-fc3c2d891696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39038", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14369", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39038\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Agentflow BPM enterprise management system has improper authentication. A remote attacker with general user privilege can change the name of the user account to acquire arbitrary account privilege, and access, manipulate system or disrupt service.\n\ud83d\udccf Published: 2022-11-10T02:20:46.420Z\n\ud83d\udccf Modified: 2025-05-01T19:06:11.492Z\n\ud83d\udd17 References:\n1. https://www.flowring.com/2022/09/19/%e7%94%a2%e5%93%81%e6%9b%b4%e6%96%b0agentflow-v4-0%e3%80%81v3-7%e5%a4%be%e6%aa%94%e5%8a%9f%e8%83%bd%e8%b3%87%e5%ae%89%e4%bf%ae%e6%ad%a3/\n2. https://www.twcert.org.tw/tw/cp-132-6684-53149-1.html", "creation_timestamp": "2025-05-01T19:14:49.000000Z"}, {"uuid": "ba04653f-d212-45dc-b8b1-2c6ed6dc20fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39036", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14368", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39036\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.\n\ud83d\udccf Published: 2022-11-10T02:20:44.321Z\n\ud83d\udccf Modified: 2025-05-01T19:06:40.147Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-6682-21207-1.html\n2. https://www.flowring.com/2022/09/19/%e7%94%a2%e5%93%81%e6%9b%b4%e6%96%b0agentflow-v4-0%e3%80%81v3-7%e5%a4%be%e6%aa%94%e5%8a%9f%e8%83%bd%e8%b3%87%e5%ae%89%e4%bf%ae%e6%ad%a3/", "creation_timestamp": "2025-05-01T19:14:48.000000Z"}, {"uuid": "ac00da24-9a39-40c1-b3e3-83d7c2e58ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39036", "type": "seen", "source": "https://t.me/cibsecurity/52921", "content": "\u203c CVE-2022-39036 \u203c\n\nThe file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:52:16.000000Z"}, {"uuid": "8e830de8-225c-495a-9206-68c422f99e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39038", "type": "seen", "source": "https://t.me/cibsecurity/52910", "content": "\u203c CVE-2022-39038 \u203c\n\nAgentflow BPM enterprise management system has improper authentication. A remote attacker with general user privilege can change the name of the user account to acquire arbitrary account privilege, and access, manipulate system or disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:49:17.000000Z"}]}