CVE-2023-31868

Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sage:x3:12.14.0.50-0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:02

Type Values Removed Values Added
References () http://sage.com - Product () http://sage.com - Product
References () https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt - Third Party Advisory () https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt - Third Party Advisory

28 Jun 2023, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 12:15

Updated : 2024-11-21 08:02


NVD link : CVE-2023-31868

Mitre link : CVE-2023-31868

CVE.ORG link : CVE-2023-31868


JSON object : View

Products Affected

sage

  • x3
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')