CVE-2023-48641

Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources.
Configurations

Configuration 1 (hide)

cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*

History

15 Dec 2023, 14:28

Type Values Removed Values Added
CPE cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*
References () https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 - () https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 - Vendor Advisory
CWE CWE-639
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

12 Dec 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 08:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-48641

Mitre link : CVE-2023-48641

CVE.ORG link : CVE-2023-48641


JSON object : View

Products Affected

archerirm

  • archer
CWE
CWE-639

Authorization Bypass Through User-Controlled Key