The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
References
Configurations
No configuration.
History
12 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-12 15:15
Updated : 2025-06-12 16:06
NVD link : CVE-2025-49199
Mitre link : CVE-2025-49199
CVE.ORG link : CVE-2025-49199
JSON object : View
Products Affected
No product.
CWE
CWE-345
Insufficient Verification of Data Authenticity