HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
2024-01-03T03:15:09.200
2025-06-03T15:15:41.983
Modified
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | hcltech | dryice_myxalytics | 5.9 | Yes |
| Application | hcltech | dryice_myxalytics | 6.0 | Yes |
| Application | hcltech | dryice_myxalytics | 6.1 | Yes |