Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
References
Link | Resource |
---|---|
https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md | Exploit Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Press/Media Coverage |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
https://www.henschen.com/government | Product |
https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md | Exploit Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Press/Media Coverage |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
https://www.henschen.com/government | Product |
Configurations
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - Exploit, Third Party Advisory | |
References | () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Press/Media Coverage | |
References | () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource | |
References | () https://www.henschen.com/government - Product |
11 Dec 2023, 15:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Henschen
Henschen court Document Management |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-330 | |
CPE | cpe:2.3:a:henschen:court_document_management:*:*:*:*:*:*:*:* | |
References | () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource | |
References | () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Press/Media Coverage | |
References | () https://www.henschen.com/government - Product | |
References | () https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md - Exploit, Third Party Advisory |
30 Nov 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Nov 2023, 18:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-30 18:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6376
Mitre link : CVE-2023-6376
CVE.ORG link : CVE-2023-6376
JSON object : View
Products Affected
henschen
- court_document_management
CWE
CWE-330
Use of Insufficiently Random Values