BASIS BBj versions prior to 25.00 contain a Jetty-served web endpoint that fails to properly validate or canonicalize input path segments. This allows unauthenticated directory traversal sequences to cause the server to read arbitrary system files accessible to the account running the service. Retrieved configuration artifacts may contain account credentials used for BBj Enterprise Manager; possession of these credentials enables administrative access and use of legitimate management functionality that can result in execution of system commands under the service account. Depending on the operating system and the privileges of the BBj service account, this issue may also allow access to other sensitive files on the host, including operating system or application data, potentially exposing additional confidential information.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Basis International
Basis International bbj |
|
| Vendors & Products |
Basis International
Basis International bbj |
Thu, 20 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Nov 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BASIS BBj versions prior to 25.00 contain a Jetty-served web endpoint that fails to properly validate or canonicalize input path segments. This allows unauthenticated directory traversal sequences to cause the server to read arbitrary system files accessible to the account running the service. Retrieved configuration artifacts may contain account credentials used for BBj Enterprise Manager; possession of these credentials enables administrative access and use of legitimate management functionality that can result in execution of system commands under the service account. Depending on the operating system and the privileges of the BBj service account, this issue may also allow access to other sensitive files on the host, including operating system or application data, potentially exposing additional confidential information. | |
| Title | BASIS BBj < 25.00 Unauthenticated Arbitrary File Read RCE | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-11-20T15:31:38.794Z
Updated: 2025-11-20T16:21:05.006Z
Reserved: 2025-04-15T19:15:22.585Z
Link: CVE-2025-34320
Updated: 2025-11-20T16:20:30.234Z
Status : Awaiting Analysis
Published: 2025-11-20T16:15:57.583
Modified: 2025-11-21T15:13:13.800
Link: CVE-2025-34320
No data.