CVE-2023-47250

In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:m-privacy:mprivacy-tools:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:rsbac-policy-tgpro:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:tightgatevnc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory
References () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory
References () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product

30 Nov 2023, 20:55

Type Values Removed Values Added
CPE cpe:2.3:a:m-privacy:tightgatevnc:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:mprivacy-tools:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:rsbac-policy-tgpro:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-276
References () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product
References () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Nov/13 - () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory
First Time M-privacy
M-privacy tightgatevnc
M-privacy mprivacy-tools
M-privacy rsbac-policy-tgpro

28 Nov 2023, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -

27 Nov 2023, 22:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2023/Nov/13 -

22 Nov 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-22 18:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47250

Mitre link : CVE-2023-47250

CVE.ORG link : CVE-2023-47250


JSON object : View

Products Affected

m-privacy

  • tightgatevnc
  • rsbac-policy-tgpro
  • mprivacy-tools
CWE
CWE-276

Incorrect Default Permissions