Dernières vulnérabilités du Mardi 27 Juin 2023

Dernières vulnérabilités du Mardi 27 Juin 2023
{{titre}}

Dernière mise à jour efféctuée le 27/06/2023 à 22:34:39

(0) Vulnérabilité(s) CRITICAL [9.0, 10.0]

(2) Vulnérabilité(s) HIGH [7.0, 8.9]

Vulnérabilité ID : CVE-2023-3405

Première publication le : 27-06-2023 15:15:11
Dernière modification le : 27-06-2023 16:15:35

Description :
Unchecked parameter value in M-Files Server in versions before 23.6.12695.3 (excluding 23.2 SR2 and newer) allows anonymous user to cause denial of service

CVE ID : CVE-2023-3405
Source : security@m-files.com
Score CVSS : 7.5

Références :
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3405 | source : security@m-files.com

Vulnérabilité : CWE-248


Vulnérabilité ID : CVE-2023-3432

Première publication le : 27-06-2023 15:15:11
Dernière modification le : 27-06-2023 16:15:35

Description :
Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9.

CVE ID : CVE-2023-3432
Source : security@huntr.dev
Score CVSS : 7.2

Références :
https://github.com/plantuml/plantuml/commit/b32500bb61ae617bb312496d6d832e4be8190797 | source : security@huntr.dev
https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51 | source : security@huntr.dev

Vulnérabilité : CWE-918


(23) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Vulnérabilité ID : CVE-2023-30993

Première publication le : 27-06-2023 20:15:09
Dernière modification le : 27-06-2023 20:15:09

Description :
IBM Cloud Pak for Security (CP4S) 1.9.0.0 through 1.9.2.0 could allow an attacker with a valid API key for one tenant to access data from another tenant's account. IBM X-Force ID: 254136.

CVE ID : CVE-2023-30993
Source : psirt@us.ibm.com
Score CVSS : 6.8

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/254136 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/6995221 | source : psirt@us.ibm.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-3423

Première publication le : 27-06-2023 04:15:10
Dernière modification le : 27-06-2023 16:15:38

Description :
Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v 1.2.0.

CVE ID : CVE-2023-3423
Source : security@huntr.dev
Score CVSS : 6.5

Références :
https://github.com/cloudexplorer-dev/cloudexplorer-lite/commit/7d4dab60352079953b7be120afe9bd14983ae3bc | source : security@huntr.dev
https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139 | source : security@huntr.dev

Vulnérabilité : CWE-521


Vulnérabilité ID : CVE-2023-36000

Première publication le : 27-06-2023 15:15:11
Dernière modification le : 27-06-2023 16:15:35

Description :
A missing authorization check in the MacOS agent configuration endpoint of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to obtain sensitive information. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.

CVE ID : CVE-2023-36000
Source : security@proofpoint.com
Score CVSS : 6.5

Références :
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | source : security@proofpoint.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-34240

Première publication le : 27-06-2023 17:15:09
Dernière modification le : 27-06-2023 18:34:43

Description :
Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-34240
Source : security-advisories@github.com
Score CVSS : 6.5

Références :
https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4 | source : security-advisories@github.com

Vulnérabilité : CWE-521


Vulnérabilité ID : CVE-2022-34352

Première publication le : 27-06-2023 18:15:11
Dernière modification le : 27-06-2023 18:34:43

Description :
IBM QRadar SIEM 7.5.0 is vulnerable to information exposure allowing a delegated Admin tenant user with a specific domain security profile assigned to see data from other domains. IBM X-Force ID: 230403.

CVE ID : CVE-2022-34352
Source : psirt@us.ibm.com
Score CVSS : 6.5

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/230403 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7006057 | source : psirt@us.ibm.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-3412

Première publication le : 27-06-2023 04:15:10
Dernière modification le : 27-06-2023 16:15:38

Description :
The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0.0. This is due to a missing capability check on the ajax_store_save() function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify plugin settings and inject malicious web scripts.

CVE ID : CVE-2023-3412
Source : security@wordfence.com
Score CVSS : 6.4

Références :
https://plugins.trac.wordpress.org/browser/image-map-pro-lite/trunk/image-map-pro-wordpress-lite.php#L410 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/b58403df-af09-4d74-88e6-140e3f2f291b?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3411

Première publication le : 27-06-2023 04:15:10
Dernière modification le : 27-06-2023 16:15:38

Description :
The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due to missing nonce validation on the ajax_store_save() function. This makes it possible for unauthenticated attackers to modify plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2023-3411
Source : security@wordfence.com
Score CVSS : 6.1

Références :
https://plugins.trac.wordpress.org/browser/image-map-pro-lite/trunk/image-map-pro-wordpress-lite.php#L410 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/63e108f4-5d9d-4bcf-aef9-aa856f4241ea?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-32339

Première publication le : 27-06-2023 17:15:09
Dernière modification le : 27-06-2023 18:34:43

Description :
IBM Business Automation Workflow is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 255587.

CVE ID : CVE-2023-32339
Source : psirt@us.ibm.com
Score CVSS : 6.1

Références :
https://https://www.ibm.com/support/pages/node/6998727 | source : psirt@us.ibm.com
https://https://www.ibm.com/support/pages/node/7001291 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/6998727 | source : psirt@us.ibm.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3132

Première publication le : 27-06-2023 03:15:09
Dernière modification le : 27-06-2023 16:15:38

Description :
The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail.

CVE ID : CVE-2023-3132
Source : security@wordfence.com
Score CVSS : 5.9

Références :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2923512%40mainwp-child&new=2923512%40mainwp-child&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-26276

Première publication le : 27-06-2023 18:15:12
Dernière modification le : 27-06-2023 18:34:43

Description :
IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 248147.

CVE ID : CVE-2023-26276
Source : psirt@us.ibm.com
Score CVSS : 5.9

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/248147 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7006081 | source : psirt@us.ibm.com

Vulnérabilité : CWE-327


Vulnérabilité ID : CVE-2023-2818

Première publication le : 27-06-2023 15:15:10
Dernière modification le : 27-06-2023 16:15:35

Description :
An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected.

CVE ID : CVE-2023-2818
Source : security@proofpoint.com
Score CVSS : 5.5

Références :
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | source : security@proofpoint.com

Vulnérabilité : CWE-281


Vulnérabilité ID : CVE-2023-3371

Première publication le : 27-06-2023 02:15:09
Dernière modification le : 27-06-2023 16:15:41

Description :
The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content.

CVE ID : CVE-2023-3371
Source : security@wordfence.com
Score CVSS : 5.3

Références :
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.7.3/EmbedPress/Includes/Classes/Helper.php#L231 | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.7.3/EmbedPress/Includes/Classes/Helper.php#L278 | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/embedpress/tags/3.7.3/Gutenberg/block-backend/block-embedpress.php#L30 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2930523/embedpress#file10 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/2930523/embedpress#file28 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1033b4d-82a0-4484-aebf-f35d6a2a9a13?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-321


Vulnérabilité ID : CVE-2023-3431

Première publication le : 27-06-2023 15:15:11
Dernière modification le : 27-06-2023 16:15:35

Description :
Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9.

CVE ID : CVE-2023-3431
Source : security@huntr.dev
Score CVSS : 5.3

Références :
https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | source : security@huntr.dev
https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c | source : security@huntr.dev

Vulnérabilité : CWE-284


Vulnérabilité ID : CVE-2023-34098

Première publication le : 27-06-2023 17:15:09
Dernière modification le : 27-06-2023 18:34:43

Description :
Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-34098
Source : security-advisories@github.com
Score CVSS : 5.3

Références :
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023 | source : security-advisories@github.com
https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9 | source : security-advisories@github.com
https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a | source : security-advisories@github.com
https://www.shopware.com/en/changelog-sw5/#5-7-18 | source : security-advisories@github.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-34099

Première publication le : 27-06-2023 17:15:09
Dernière modification le : 27-06-2023 18:34:43

Description :
Shopware is an open source e-commerce software. The mail validation in the registration process had some flaws, so it was possible to construct different mail addresses, that in the end result in the same address, which is shared by multiple accounts. This issue has been addressed in version 5.7.18 and users are advised to update. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-34099
Source : security-advisories@github.com
Score CVSS : 5.3

Références :
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023 | source : security-advisories@github.com
https://github.com/shopware/shopware/security/advisories/GHSA-gh66-fp7j-98v5 | source : security-advisories@github.com
https://github.com/shopware5/shopware/commit/39cc714d9a0be33b43877044d0b88ea3c6b43f3d | source : security-advisories@github.com
https://www.shopware.com/en/changelog-sw5/#5-7-18 | source : security-advisories@github.com

Vulnérabilité : CWE-754


Vulnérabilité ID : CVE-2023-36463

Première publication le : 27-06-2023 20:15:09
Dernière modification le : 27-06-2023 20:15:09

Description :
Meldekarten generator is an open source project to create a program, running locally in the browser without the need for an internet-connection, to create, store and print registration cards for volunteers. All text fields on the webpage are vulnerable to XSS attacks. The user input isn't (fully) sanitized after submission. This issue has been addressed in commit `77e04f4af` which is included in the `1.0.0b1.1.2` release. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-36463
Source : security-advisories@github.com
Score CVSS : 5.3

Références :
https://github.com/jucktnich/meldekarten-generator/commit/77e04f4af85a6d0b08e616d40eaa81877a108c96 | source : security-advisories@github.com
https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7 | source : security-advisories@github.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-23468

Première publication le : 27-06-2023 19:15:09
Dernière modification le : 27-06-2023 19:15:09

Description :
IBM Robotic Process Automation for Cloud Pak 21.0.1 through 21.0.7.3 and 23.0.0 through 23.0.3 is vulnerable to insufficient security configuration which may allow creation of namespaces within a cluster. IBM X-Force ID: 244500.

CVE ID : CVE-2023-23468
Source : psirt@us.ibm.com
Score CVSS : 5.1

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/244500 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7005999 | source : psirt@us.ibm.com


Vulnérabilité ID : CVE-2023-35998

Première publication le : 27-06-2023 15:15:10
Dernière modification le : 27-06-2023 16:15:35

Description :
A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.

CVE ID : CVE-2023-35998
Source : security@proofpoint.com
Score CVSS : 4.6

Références :
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | source : security@proofpoint.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-26274

Première publication le : 27-06-2023 18:15:12
Dernière modification le : 27-06-2023 18:34:43

Description :
IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 248144.

CVE ID : CVE-2023-26274
Source : psirt@us.ibm.com
Score CVSS : 4.6

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/248144 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7006085 | source : psirt@us.ibm.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-36002

Première publication le : 27-06-2023 15:15:11
Dernière modification le : 27-06-2023 16:15:35

Description :
A missing authorization check in multiple URL validation endpoints of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to smuggle content via DNS lookups. All versions before 7.14.3 are affected.

CVE ID : CVE-2023-36002
Source : security@proofpoint.com
Score CVSS : 4.3

Références :
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | source : security@proofpoint.com

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-26273

Première publication le : 27-06-2023 18:15:12
Dernière modification le : 27-06-2023 18:34:43

Description :
IBM QRadar SIEM 7.5.0 could allow an authenticated user to perform unauthorized actions due to hazardous input validation. IBM X-Force ID: 248134.

CVE ID : CVE-2023-26273
Source : psirt@us.ibm.com
Score CVSS : 4.3

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/248134 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7006083 | source : psirt@us.ibm.com

Vulnérabilité : CWE-20


Vulnérabilité ID : CVE-2023-28857

Première publication le : 27-06-2023 18:15:13
Dernière modification le : 27-06-2023 18:34:43

Description :
Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same password as for initially configured LDAP server, which can lead to a password leak. An unauthenticated user can leak the password used to LDAP connection configured on server. This issue has been addressed in version 6.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-28857
Source : security-advisories@github.com
Score CVSS : 4.0

Références :
https://apereo.github.io/2023/02/20/x509-vuln/ | source : security-advisories@github.com
https://github.com/apereo/cas/releases/tag/v6.6.6 | source : security-advisories@github.com
https://securitylab.github.com/advisories/GHSL-2023-009_Apereo_CAS/ | source : security-advisories@github.com

Vulnérabilité : CWE-200


Vulnérabilité ID : CVE-2023-22593

Première publication le : 27-06-2023 19:15:09
Dernière modification le : 27-06-2023 19:15:09

Description :
IBM Robotic Process Automation for Cloud Pak 21.0.1 through 21.0.7.3 and 23.0.0 through 23.0.3 is vulnerable to security misconfiguration of the Redis container which may provide elevated privileges. IBM X-Force ID: 244074.

CVE ID : CVE-2023-22593
Source : psirt@us.ibm.com
Score CVSS : 4.0

Références :
https://exchange.xforce.ibmcloud.com/vulnerabilities/244074 | source : psirt@us.ibm.com
https://www.ibm.com/support/pages/node/7006001 | source : psirt@us.ibm.com


(1) Vulnérabilité(s) LOW [0.1, 3.9]

Vulnérabilité ID : CVE-2023-22834

Première publication le : 27-06-2023 00:15:09
Dernière modification le : 27-06-2023 01:40:40

Description :
The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.

CVE ID : CVE-2023-22834
Source : cve-coordination@palantir.com
Score CVSS : 2.7

Références :
https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8 | source : cve-coordination@palantir.com


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.