cve/2023/CVE-2023-6263.md

18 lines
953 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6263)
![](https://img.shields.io/static/v1?label=Product&message=NxCloud&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2023.1.0.40440%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server to NxCloud by using the exact identification of a legitimate VMS server. As result, it was possible to retrieve authorization headers from legitimate users when the legitimate client connects to the fake VMS server.
### POC
#### Reference
- https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing
#### Github
No PoCs found on GitHub currently.