Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication.
Fixes

Solution

>The vulnerability has been fixed in the latest version.


Workaround

No workaround given by the vendor.

History

Fri, 20 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-09-20T14:52:13.615Z

Reserved: 2023-08-31T07:09:09.454Z

Link: CVE-2023-4659

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.631Z

cve-icon NVD

Status : Modified

Published: 2023-10-02T15:15:15.017

Modified: 2024-11-21T08:35:37.813

Link: CVE-2023-4659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.