The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform.
Successful exploitation of this vulnerability could allow the attacker to gain full access to the customers’ data and completely compromise the targeted platform.
Successful exploitation of this vulnerability could allow the attacker to gain full access to the customers’ data and completely compromise the targeted platform.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58715 | The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform. Successful exploitation of this vulnerability could allow the attacker to gain full access to the customers’ data and completely compromise the targeted platform. |
Fixes
Solution
Upgrade to ADiTaaS version 5.1.1 or later.
Workaround
No workaround given by the vendor.
References
History
Wed, 07 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-05-07T20:38:23.422Z
Reserved: 2023-12-04T10:23:22.916Z
Link: CVE-2023-6483
Updated: 2024-08-02T08:28:21.823Z
Status : Modified
Published: 2023-12-18T08:15:07.143
Modified: 2024-11-21T08:43:56.447
Link: CVE-2023-6483
No data.
OpenCVE Enrichment
No data.
EUVD