{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-45723","assignerOrgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","state":"PUBLISHED","assignerShortName":"HCL","dateReserved":"2023-10-10T21:26:10.163Z","datePublished":"2024-01-03T02:50:02.258Z","dateUpdated":"2025-06-18T15:27:02.999Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"DRYiCE MyXalytics","vendor":"HCL Software","versions":[{"status":"affected","version":"5.9, 6.0, 6.1"}]}],"datePublic":"2024-01-03T00:22:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability. &nbsp;Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server.<br>"}],"value":"HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability.  Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server.\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","shortName":"HCL","dateUpdated":"2024-01-03T02:50:02.258Z"},"references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608"}],"source":{"discovery":"UNKNOWN"},"title":"Path Traversal which allows file upload capability affects DRYiCE MyXalytics","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:29:31.215Z"},"title":"CVE Program Container","references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-03T15:46:03.341473Z","id":"CVE-2023-45723","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-18T15:27:02.999Z"}}]}}