The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
History

Thu, 08 May 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:commvault:commvault:11.38.20:-:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.25:-:*:*:*:*:*:*

Wed, 07 May 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-05-02'}


Wed, 07 May 2025 22:15:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38. The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
Title Commvault Command Center Innovation Release Unathenticated Path Traversal Commvault Command Center Innovation Release Unathenticated Install Package Path Traversal
Weaknesses CWE-306
References

Tue, 06 May 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Commvault
Commvault commvault
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Commvault
Commvault commvault
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 02 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-05-02'}


Fri, 02 May 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

kev

{'dateAdded': '2025-05-02'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 22 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 22 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38.
Title Commvault Command Center Innovation Release Unathenticated Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-04-22T16:32:23.446Z

Updated: 2025-05-07T22:09:23.958Z

Reserved: 2025-04-15T19:15:22.545Z

Link: CVE-2025-34028

cve-icon Vulnrichment

Updated: 2025-04-22T17:29:12.281Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-22T17:16:48.027

Modified: 2025-05-08T13:59:43.527

Link: CVE-2025-34028

cve-icon Redhat

No data.