A vulnerability, which was classified as problematic, has been found in cnoa OA up to 5.1.1.5. Affected by this issue is some unknown functionality of the file /index.php?app=main&func=passport&action=login. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229376. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg | Broken Link |
| https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md | Broken Link |
| https://vuldb.com/?ctiid.229376 | Permissions Required Third Party Advisory |
| https://vuldb.com/?id.229376 | Permissions Required Third Party Advisory |
| https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg | Broken Link |
| https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md | Broken Link |
| https://vuldb.com/?ctiid.229376 | Permissions Required Third Party Advisory |
| https://vuldb.com/?id.229376 | Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 07:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.3 |
| References | () https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg - Broken Link | |
| References | () https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md - Broken Link | |
| References | () https://vuldb.com/?ctiid.229376 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.229376 - Permissions Required, Third Party Advisory |
26 May 2023, 18:06
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | (MISC) https://vuldb.com/?ctiid.229376 - Permissions Required, Third Party Advisory | |
| References | (MISC) https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md - Broken Link | |
| References | (MISC) https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg - Broken Link | |
| References | (MISC) https://vuldb.com/?id.229376 - Permissions Required, Third Party Advisory | |
| CPE | cpe:2.3:a:cnoa_oa_project:cnoa_oa:*:*:*:*:*:*:*:* |
18 May 2023, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-05-18 16:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2799
Mitre link : CVE-2023-2799
CVE.ORG link : CVE-2023-2799
JSON object : View
Products Affected
cnoa_oa_project
- cnoa_oa
CWE
CWE-259
Use of Hard-coded Password
