Omnis Studio 10.22.00 has incorrect access control. It advertises a feature for making Omnis libraries "always private" - this is supposed to be an irreversible operation. However, due to implementation issues, "always private" Omnis libraries can be opened by the Omnis Studio browser by bypassing specific checks. This violates the expected behavior of an "irreversible operation".
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html | Exploit Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2023/Jul/41 | Exploit Mailing List Third Party Advisory | 
| http://seclists.org/fulldisclosure/2023/Jul/43 | Not Applicable | 
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt | Third Party Advisory | 
| http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html | Exploit Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2023/Jul/41 | Exploit Mailing List Third Party Advisory | 
| http://seclists.org/fulldisclosure/2023/Jul/43 | Not Applicable | 
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2023/Jul/41 - Exploit, Mailing List, Third Party Advisory | |
| References | () http://seclists.org/fulldisclosure/2023/Jul/43 - Not Applicable | |
| References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt - Third Party Advisory | 
24 Oct 2024, 21:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-276 | 
31 Jul 2023, 18:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt - Third Party Advisory | |
| References | (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/41 - Exploit, Mailing List, Third Party Advisory | |
| References | (MISC) http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
| References | (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/43 - Not Applicable | |
| CWE | NVD-CWE-Other | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
| CPE | cpe:2.3:a:omnis:studio:10.22.00:*:*:*:*:*:*:* | 
26 Jul 2023, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
24 Jul 2023, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Jul 2023, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
20 Jul 2023, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-07-20 18:15
Updated : 2024-11-21 08:13
NVD link : CVE-2023-38335
Mitre link : CVE-2023-38335
CVE.ORG link : CVE-2023-38335
JSON object : View
Products Affected
                omnis
- studio
CWE
                