Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources.
References
Configurations
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
15 Dec 2023, 14:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:* | |
References | () https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 - Vendor Advisory | |
CWE | CWE-639 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
12 Dec 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-12 08:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-48641
Mitre link : CVE-2023-48641
CVE.ORG link : CVE-2023-48641
JSON object : View
Products Affected
archerirm
- archer
CWE
CWE-639
Authorization Bypass Through User-Controlled Key