Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-45687", "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "state": "PUBLISHED", "assignerShortName": "rapid7", "dateReserved": "2023-10-10T19:07:28.771Z", "datePublished": "2023-10-16T16:12:31.582Z", "dateUpdated": "2024-09-16T17:41:29.875Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "platforms": ["Linux", "Windows"], "product": "Titan MFT", "vendor": "South River Technologies", "versions": [{"lessThanOrEqual": "2.0.17.2298", "status": "affected", "version": "0", "versionType": "semver"}]}, {"defaultStatus": "unaffected", "platforms": ["Linux", "Windows"], "product": "Titan SFTP", "vendor": "South River Technologies", "versions": [{"lessThanOrEqual": "2.0.17.2298", "status": "affected", "version": "0", "versionType": "semver"}]}], "datePublic": "2023-10-16T15:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing"}], "value": "A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing"}], "problemTypes": [{"descriptions": [{"cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7", "dateUpdated": "2023-10-16T16:12:31.582Z"}, "references": [{"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/"}, {"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690"}], "source": {"discovery": "UNKNOWN"}, "title": "Authentication bypass via session fixation in Titan MFT and Titan SFTP servers", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T20:29:31.676Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/", "tags": ["x_transferred"]}, {"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "southrivertech", "product": "titan_mft_server", "cpes": ["cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "2.0.18", "versionType": "custom"}]}, {"vendor": "southrivertech", "product": "titan_mft_server", "cpes": ["cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:windows:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "2.0.18", "versionType": "custom"}]}, {"vendor": "southrivertech", "product": "titan_sftp_server", "cpes": ["cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "2.0.18", "versionType": "custom"}]}, {"vendor": "southrivertech", "product": "titan_sftp_server", "cpes": ["cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:windows:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "2.0.18", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-09-16T17:39:28.123875Z", "id": "CVE-2023-45687", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-16T17:41:29.875Z"}}]}}