Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.







Advisories
Source ID Title
EUVD EUVD EUVD-2023-43169 Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.
Fixes

Solution

Socomec reports that MODULYS GP (MOD3GP-SY-120K) is an End-of-Life product. Socomec recommends using MODULYS GP2 (M4-S-XXX) instead. MODULYS GP2 (M4-S-XXX) is not affected by the above vulnerabilities.


Workaround

No workaround given by the vendor.

History

Tue, 24 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-24T18:13:14.700Z

Reserved: 2023-09-06T15:41:16.528Z

Link: CVE-2023-39446

cve-icon Vulnrichment

Updated: 2024-08-02T18:10:20.696Z

cve-icon NVD

Status : Modified

Published: 2023-09-18T21:15:56.117

Modified: 2024-11-21T08:15:26.663

Link: CVE-2023-39446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.