The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2023-10-26T16:17:37.365Z

Updated: 2024-08-02T20:21:15.390Z

Reserved: 2023-10-25T15:23:55.532Z

Link: CVE-2023-45317

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-26T17:15:09.177

Modified: 2024-11-21T08:26:44.037

Link: CVE-2023-45317

cve-icon Redhat

No data.