An issue was discovered in Plixer Scrutinizer before 19.3.1. It exposes debug logs to unauthenticated users at the /debug/ URL path. With knowledge of valid IP addresses and source types, an unauthenticated attacker can download debug logs containing application-related information.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md | Exploit Third Party Advisory |
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md - Exploit, Third Party Advisory |
16 Oct 2023, 18:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:plixer:scrutinizer:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md - Exploit, Third Party Advisory | |
CWE | CWE-532 | |
First Time |
Plixer
Plixer scrutinizer |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.7 |
12 Oct 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-12 23:15
Updated : 2024-11-21 08:20
NVD link : CVE-2023-41263
Mitre link : CVE-2023-41263
CVE.ORG link : CVE-2023-41263
JSON object : View
Products Affected
plixer
- scrutinizer
CWE
CWE-532
Insertion of Sensitive Information into Log File