A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability.
History

Thu, 02 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2023-06-14T08:00:04.536Z

Updated: 2025-01-02T20:40:18.187Z

Reserved: 2023-06-14T06:12:36.410Z

Link: CVE-2023-3238

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:08.194Z

cve-icon NVD

Status : Modified

Published: 2023-06-14T08:15:09.713

Modified: 2024-11-21T08:16:46.277

Link: CVE-2023-3238

cve-icon Redhat

No data.