{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3562","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-04-13T22:42:41.974Z","datePublished":"2025-04-14T10:31:06.480Z","dateUpdated":"2025-04-14T12:07:47.176Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-04-14T10:31:06.480Z"},"title":"Yonyou YonBIP userfile FileInputStream path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Yonyou","product":"YonBIP","versions":[{"version":"MA2.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Yonyou YonBIP MA2.7. It has been declared as problematic. Affected by this vulnerability is the function FileInputStream of the file /mobsm/common/userfile. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Yonyou YonBIP MA2.7 wurde eine problematische Schwachstelle ausgemacht. Dabei geht es um die Funktion FileInputStream der Datei /mobsm/common/userfile. Mit der Manipulation des Arguments path mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2025-04-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-04-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-04-14T00:47:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XingYue_Mstir (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.304603","name":"VDB-304603 | Yonyou YonBIP userfile FileInputStream path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.304603","name":"VDB-304603 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.549269","name":"Submit #549269 | Yonyou YouBIP MA2.7 Path Traversal","tags":["third-party-advisory"]},{"url":"https://wiki.shikangsi.com/post/share/7329f367-dd6e-48fb-b585-e10fbfc63bb2","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T12:07:31.861410Z","id":"CVE-2025-3562","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T12:07:47.176Z"}}]}}