An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
References
Link | Resource |
---|---|
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | Vendor Advisory |
Configurations
History
17 Jan 2024, 20:28
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
References | () https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 - Vendor Advisory | |
First Time |
Savignano s\/notify
Savignano |
|
CPE | cpe:2.3:a:savignano:s\/notify:*:*:*:*:*:jira:*:* |
09 Jan 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 07:15
Updated : 2024-02-28 14:09
NVD link : CVE-2023-50930
Mitre link : CVE-2023-50930
CVE.ORG link : CVE-2023-50930
JSON object : View
Products Affected
savignano
- s-notify
CWE
CWE-352
Cross-Site Request Forgery (CSRF)