Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.9 |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 - Third Party Advisory, US Government Resource |
07 Nov 2023, 04:17
Type | Values Removed | Values Added |
---|---|---|
Summary | Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application. |
21 Sep 2023, 18:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Socomec modulys Gp
Socomec modulys Gp Firmware Socomec |
|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:o:socomec:modulys_gp_firmware:01.12.10:*:*:*:*:*:*:* cpe:2.3:h:socomec:modulys_gp:-:*:*:*:*:*:*:* |
19 Sep 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-18 21:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39446
Mitre link : CVE-2023-39446
CVE.ORG link : CVE-2023-39446
JSON object : View
Products Affected
socomec
- modulys_gp_firmware
- modulys_gp
CWE
CWE-352
Cross-Site Request Forgery (CSRF)