The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:28:15.955Z

Reserved: 2023-10-25T15:23:55.532Z

Link: CVE-2023-45317

cve-icon Vulnrichment

Updated: 2024-08-02T20:21:15.390Z

cve-icon NVD

Status : Modified

Published: 2023-10-26T17:15:09.177

Modified: 2024-11-21T08:26:44.037

Link: CVE-2023-45317

cve-icon Redhat

No data.