A vulnerability, which was classified as problematic, has been found in cnoa OA up to 5.1.1.5. Affected by this issue is some unknown functionality of the file /index.php?app=main&func=passport&action=login. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229376. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg | Broken Link |
https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md | Broken Link |
https://vuldb.com/?ctiid.229376 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.229376 | Permissions Required Third Party Advisory |
https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg | Broken Link |
https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md | Broken Link |
https://vuldb.com/?ctiid.229376 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.229376 | Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.3 |
References | () https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg - Broken Link | |
References | () https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md - Broken Link | |
References | () https://vuldb.com/?ctiid.229376 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.229376 - Permissions Required, Third Party Advisory |
26 May 2023, 18:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cnoa_oa_project:cnoa_oa:*:*:*:*:*:*:*:* | |
First Time |
Cnoa Oa Project
Cnoa Oa Project cnoa Oa |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md - Broken Link | |
References | (MISC) https://vuldb.com/?id.229376 - Permissions Required, Third Party Advisory | |
References | (MISC) https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg - Broken Link | |
References | (MISC) https://vuldb.com/?ctiid.229376 - Permissions Required, Third Party Advisory |
Information
Published : 2023-05-18 16:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2799
Mitre link : CVE-2023-2799
CVE.ORG link : CVE-2023-2799
JSON object : View
Products Affected
cnoa_oa_project
- cnoa_oa
CWE
CWE-259
Use of Hard-coded Password