Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.
References
Link | Resource |
---|---|
http://sage.com | Product |
https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt | Third Party Advisory |
http://sage.com | Product |
https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://sage.com - Product | |
References | () https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt - Third Party Advisory |
28 Jun 2023, 16:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-22 12:15
Updated : 2024-11-21 08:02
NVD link : CVE-2023-31868
Mitre link : CVE-2023-31868
CVE.ORG link : CVE-2023-31868
JSON object : View
Products Affected
sage
- x3
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')