cve/2023/CVE-2023-6263.md
2024-06-18 02:51:15 +02:00

18 lines
953 B
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-6263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6263)
![](https://img.shields.io/static/v1?label=Product&message=NxCloud&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2023.1.0.40440%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server to NxCloud by using the exact identification of a legitimate VMS server. As result, it was possible to retrieve authorization headers from legitimate users when the legitimate client connects to the fake VMS server.
### POC
#### Reference
- https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing
#### Github
No PoCs found on GitHub currently.