cvelist/2023/46xxx/CVE-2023-46596.json

107 lines
4.0 KiB
JSON
Raw Normal View History

2023-10-23 11:00:31 +00:00
{
2024-02-15 07:00:34 +00:00
"data_version": "4.0",
2023-10-23 11:00:31 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-46596",
2024-02-15 07:00:34 +00:00
"ASSIGNER": "security.vulnerabilities@algosec.com",
"STATE": "PUBLIC"
2023-10-23 11:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-15 10:00:32 +00:00
"value": "\nImproper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n"
2024-02-15 07:00:34 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Algosec",
"product": {
"product_data": [
{
"product_name": "Algosec FireFlow",
"version": {
"version_data": [
{
"version_affected": "=",
2024-02-15 10:00:32 +00:00
"version_value": "A32.20, A32.50, A32.60"
2024-02-15 07:00:34 +00:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2024-02-15 10:00:32 +00:00
"url": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm",
2024-02-15 07:00:34 +00:00
"refsource": "MISC",
2024-02-15 10:00:32 +00:00
"name": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm"
2024-02-15 07:00:34 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
2024-02-15 10:00:32 +00:00
"value": "\n\nUpgrade ASMS suite to&nbsp;A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://portal.algosec.com/en/downloads/hotfix_releases\">https://portal.algosec.com/en/downloads/hotfix_releases</a><br>"
2024-02-15 07:00:34 +00:00
}
],
2024-02-15 10:00:32 +00:00
"value": "\nUpgrade ASMS suite to\u00a0A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n\n https://portal.algosec.com/en/downloads/hotfix_releases https://portal.algosec.com/en/downloads/hotfix_releases \n"
2024-02-15 07:00:34 +00:00
}
],
"credits": [
{
"lang": "en",
"value": "Micha\u0142 Bogdanowicz from Nordea Bank ABP (https://www.linkedin.com/in/micha%C5%82-bogdanowicz-603267a8/)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
2023-10-23 11:00:31 +00:00
}
]
}
}