cvelist/2023/48xxx/CVE-2023-48392.json

102 lines
3.3 KiB
JSON
Raw Normal View History

2023-11-16 05:00:34 +00:00
{
2023-12-15 10:00:32 +00:00
"data_version": "4.0",
2023-11-16 05:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-48392",
2023-12-15 10:00:32 +00:00
"ASSIGNER": "cve@cert.org.tw",
"STATE": "PUBLIC"
2023-11-16 05:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-15 10:00:32 +00:00
"value": "Kaifa Technology WebITR is an online attendance system, it has a vulnerability in using hard-coded encryption key. An unauthenticated remote attacker can generate valid token parameter and exploit this vulnerability to access system with arbitrary user account, including administrator\u2019s account, to execute login account\u2019s permissions, and obtain relevant information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-10-14 04:00:31 +00:00
"value": "CWE-321 Use of Hard-coded Cryptographic Key",
"cweId": "CWE-321"
2023-12-15 10:00:32 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kaifa Technology",
"product": {
"product_data": [
{
"product_name": "WebITR",
"version": {
"version_data": [
{
"version_affected": "=",
2024-01-17 08:00:38 +00:00
"version_value": "2_1_0_19"
2023-12-15 10:00:32 +00:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7622-57e5f-1.html",
"refsource": "MISC",
"name": "https://www.twcert.org.tw/tw/cp-132-7622-57e5f-1.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "TVN-202312019",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
2024-10-14 04:00:31 +00:00
"value": "Update to 2_1_0_23 or latest version.\n\n<br>"
2023-12-15 10:00:32 +00:00
}
],
2024-10-14 04:00:31 +00:00
"value": "Update to 2_1_0_23 or latest version."
2023-12-15 10:00:32 +00:00
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2023-11-16 05:00:34 +00:00
}
]
}
}