CVE-2023-31823

An issue found in Marui Co Marui Official app v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Marui Official Store function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:marui:marui:13.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 08:02

Type Values Removed Values Added
References () http://marui.com - Product () http://marui.com - Product
References () https://github.com/syz913/CVE-reports/blob/main/CVE-2023-31823.md - Exploit, Third Party Advisory () https://github.com/syz913/CVE-reports/blob/main/CVE-2023-31823.md - Exploit, Third Party Advisory

25 Jul 2023, 18:57

Type Values Removed Values Added
References (MISC) http://marui.com - (MISC) http://marui.com - Product
References (MISC) https://github.com/syz913/CVE-reports/blob/main/CVE-2023-31823.md - (MISC) https://github.com/syz913/CVE-reports/blob/main/CVE-2023-31823.md - Exploit, Third Party Advisory
First Time Marui
Marui marui
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:marui:marui:13.6.1:*:*:*:*:*:*:*
CWE CWE-319

13 Jul 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-13 15:15

Updated : 2024-11-21 08:02


NVD link : CVE-2023-31823

Mitre link : CVE-2023-31823

CVE.ORG link : CVE-2023-31823


JSON object : View

Products Affected

marui

  • marui
CWE
CWE-319

Cleartext Transmission of Sensitive Information