Remote Code Execution Vulnerability in com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() Method

Remote Code Execution Vulnerability in com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() Method

CVE-2022-38130 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.

Learn more about our Cis Benchmark Audit For Microsoft Sql Server.