CVE-2023-6376

Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
Configurations

Configuration 1 (hide)

cpe:2.3:a:henschen:court_document_management:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.3
References () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - Exploit, Third Party Advisory () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - Exploit, Third Party Advisory
References () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Press/Media Coverage () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Press/Media Coverage
References () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource
References () https://www.henschen.com/government - Product () https://www.henschen.com/government - Product

11 Dec 2023, 15:12

Type Values Removed Values Added
First Time Henschen
Henschen court Document Management
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-330
CPE cpe:2.3:a:henschen:court_document_management:*:*:*:*:*:*:*:*
References () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource
References () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Press/Media Coverage
References () https://www.henschen.com/government - () https://www.henschen.com/government - Product
References () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - Exploit, Third Party Advisory

30 Nov 2023, 21:15

Type Values Removed Values Added
References
  • () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems -

30 Nov 2023, 18:18

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-30 18:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6376

Mitre link : CVE-2023-6376

CVE.ORG link : CVE-2023-6376


JSON object : View

Products Affected

henschen

  • court_document_management
CWE
CWE-330

Use of Insufficiently Random Values