Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.9 |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 - Third Party Advisory, US Government Resource |
07 Nov 2023, 04:17
Type | Values Removed | Values Added |
---|---|---|
Summary | Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application. |
21 Sep 2023, 18:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Socomec modulys Gp Firmware
Socomec modulys Gp Socomec |
|
CPE | cpe:2.3:o:socomec:modulys_gp_firmware:01.12.10:*:*:*:*:*:*:* cpe:2.3:h:socomec:modulys_gp:-:*:*:*:*:*:*:* |
19 Sep 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-18 21:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39446
Mitre link : CVE-2023-39446
CVE.ORG link : CVE-2023-39446
JSON object : View
Products Affected
socomec
- modulys_gp
- modulys_gp_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)