This post covers three vulnerabilities affecting the Hyland Alfresco Transformation Service (ATS) and related transformation components. Each issue is remotely exploitable and does not require authentication.
This vulnerability allows unauthenticated attackers to abuse absolute path traversal in transformation flows to achieve both arbitrary file read and server-side request forgery (SSRF).
This vulnerability affects both:
The issue originates in transformation handling logic that exists in the core transformation code. Since ATS packages and executes Transform Core internally, both standalone ATS deployments and Community Transform Core AIO deployments are affected if running vulnerable versions.
Upgrade to a fixed version (preferred).
This vulnerability allows unauthenticated attackers to trigger SSRF through the document processing functionality.
This vulnerability affects:
This issue is related to how the transformation service processes and handles external resource requests during document processing. It is exposed through the service layer. Transform Core by itself does not expose a network endpoint and therefore is not independently exploitable in this context without the service layer.
Upgrade to a fixed version (preferred).
This vulnerability allows unauthorized access to achieve remote code execution via argument injection in document processing functionality.
This vulnerability affects:
The issue is caused by improper handling of arguments passed during document processing operations within the service runtime. Exploitation requires the network-exposed service component. Transform Core alone does not expose this execution surface without the ATS service orchestration layer.
Upgrade to a fixed version (preferred).
Acknowledgment: thanks to Piotr Bazydło (watchTowr) for responsible disclosure.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.