RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30275 | RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T11:53:52.767Z
Reserved: 2023-02-22T20:42:56.092Z
Link: CVE-2023-26455
No data.
Status : Modified
Published: 2023-11-02T14:15:10.873
Modified: 2024-11-21T07:51:30.080
Link: CVE-2023-26455
No data.
OpenCVE Enrichment
No data.
EUVD