CVE-2023-42032
Visualware MyConnection Server doRTAAccessUPass Exposed Dangerous Method Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Visualware MyConnection Server doRTAAccessUPass Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Visualware MyConnection Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the doRTAAccessUPass method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-21611.
Visualware MyConnection Server doRTAAccessUPass Vulnerabilidad de divulgación de información de método peligroso expuesta. Esta vulnerabilidad permite a atacantes remotos revelar información confidencial sobre las instalaciones afectadas de Visualware MyConnection Server. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del método doRTAAccessUPass. El problema se debe a un método peligroso expuesto. Un atacante puede aprovechar esta vulnerabilidad para revelar información en el contexto de la aplicación. Era ZDI-CAN-21611.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Visualware MyConnection Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the doRTAAccessUPass method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose information in the context of the application.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-09-06 CVE Reserved
- 2023-09-08 CVE Published
- 2024-05-03 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-749: Exposed Dangerous Method or Function
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1398 | X_research Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://myconnectionserver.visualware.com/support/security-advisories | 2024-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Visualware Search vendor "Visualware" | MyConnection Server Search vendor "Visualware" for product "MyConnection Server" | 11.3 Search vendor "Visualware" for product "MyConnection Server" and version "11.3" | en |
Affected
|