A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. It is possible to mitigate the problem by applying the configuration setting <pages validateRequest="true" [...] viewStateEncryptionMode="Always" />. It is recommended to change the configuration settings. The vendor was initially contacted early about this disclosure but did not respond in any way. In a later statement he explains, that "the behavior described [...] is related to specific configurations that are not part of the default application setup. In standard production environments, the relevant feature (VIEWSTATE) is disabled by default, which effectively mitigates the risk of exploitation."
References
Link | Resource |
---|---|
https://tdn.totvs.com/pages/releaseview.action?pageId=284462425#COMOAUMENTARASEGURAN%C3%87ADESUAAPLICA%C3%87%C3%83O-Reduziron%C3%ADveldedetalhamentodemensagensexibidasparaousu%C3%A1rio | |
https://vuldb.com/?ctiid.238572 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.238572 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.196885 | |
https://vuldb.com/?ctiid.238572 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.238572 | Third Party Advisory VDB Entry |
Configurations
History
27 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : 2.6
v3 : 3.1 |
References |
|
|
Summary | (en) A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. It is possible to mitigate the problem by applying the configuration setting <pages validateRequest="true" [...] viewStateEncryptionMode="Always" />. It is recommended to change the configuration settings. The vendor was initially contacted early about this disclosure but did not respond in any way. In a later statement he explains, that "the behavior described [...] is related to specific configurations that are not part of the default application setup. In standard production environments, the relevant feature (VIEWSTATE) is disabled by default, which effectively mitigates the risk of exploitation." |
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuldb.com/?ctiid.238572 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.238572 - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.3 |
29 Feb 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-01 19:15
Updated : 2025-05-27 07:15
NVD link : CVE-2023-4709
Mitre link : CVE-2023-4709
CVE.ORG link : CVE-2023-4709
JSON object : View
Products Affected
totvs
- rm