CVE-2023-4709

A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. It is possible to mitigate the problem by applying the configuration setting <pages validateRequest="true" [...] viewStateEncryptionMode="Always" />. It is recommended to change the configuration settings. The vendor was initially contacted early about this disclosure but did not respond in any way. In a later statement he explains, that "the behavior described [...] is related to specific configurations that are not part of the default application setup. In standard production environments, the relevant feature (VIEWSTATE) is disabled by default, which effectively mitigates the risk of exploitation."
Configurations

Configuration 1 (hide)

cpe:2.3:a:totvs:rm:12.1:*:*:*:*:*:*:*

History

27 May 2025, 07:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : 5.0
v3 : 4.3
v2 : 2.6
v3 : 3.1
References
  • () https://tdn.totvs.com/pages/releaseview.action?pageId=284462425#COMOAUMENTARASEGURAN%C3%87ADESUAAPLICA%C3%87%C3%83O-Reduziron%C3%ADveldedetalhamentodemensagensexibidasparaousu%C3%A1rio -
  • () https://vuldb.com/?submit.196885 -
Summary (en) A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-238572. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. It is possible to mitigate the problem by applying the configuration setting <pages validateRequest="true" [...] viewStateEncryptionMode="Always" />. It is recommended to change the configuration settings. The vendor was initially contacted early about this disclosure but did not respond in any way. In a later statement he explains, that "the behavior described [...] is related to specific configurations that are not part of the default application setup. In standard production environments, the relevant feature (VIEWSTATE) is disabled by default, which effectively mitigates the risk of exploitation."

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://vuldb.com/?ctiid.238572 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?ctiid.238572 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.238572 - Third Party Advisory, VDB Entry () https://vuldb.com/?id.238572 - Third Party Advisory, VDB Entry
CVSS v2 : 5.0
v3 : 6.1
v2 : 5.0
v3 : 4.3

29 Feb 2024, 01:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-01 19:15

Updated : 2025-05-27 07:15


NVD link : CVE-2023-4709

Mitre link : CVE-2023-4709

CVE.ORG link : CVE-2023-4709


JSON object : View

Products Affected

totvs

  • rm
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')