RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30275 RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:53:52.767Z

Reserved: 2023-02-22T20:42:56.092Z

Link: CVE-2023-26455

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-02T14:15:10.873

Modified: 2024-11-21T07:51:30.080

Link: CVE-2023-26455

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.