An unauthenticated remote attacker could force all authenticated users, such as administrative users, to perform unauthorized actions by viewing the logs. This action would also grant the attacker privilege escalation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2023-03-27T19:36:02.936Z
Updated: 2024-08-02T10:07:06.208Z
Reserved: 2023-03-20T14:52:02.988Z
Link: CVE-2023-22300
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-03-27T20:15:09.343
Modified: 2024-11-21T07:44:29.050
Link: CVE-2023-22300
Redhat
No data.