An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
References
Link | Resource |
---|---|
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | Vendor Advisory |
Configurations
History
17 Jan 2024, 20:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Savignano s\/notify
Savignano |
|
CWE | CWE-352 | |
CPE | cpe:2.3:a:savignano:s\/notify:*:*:*:*:*:confluence:*:* | |
References | () https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 - Vendor Advisory |
09 Jan 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 07:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-50932
Mitre link : CVE-2023-50932
CVE.ORG link : CVE-2023-50932
JSON object : View
Products Affected
savignano
- s\/notify
CWE
CWE-352
Cross-Site Request Forgery (CSRF)