An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
References
Link | Resource |
---|---|
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | Vendor Advisory |
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
References | () https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 - Vendor Advisory |
17 Jan 2024, 20:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 07:15
Updated : 2024-11-21 08:37
NVD link : CVE-2023-50932
Mitre link : CVE-2023-50932
CVE.ORG link : CVE-2023-50932
JSON object : View
Products Affected
savignano
- s\/notify
CWE
CWE-352
Cross-Site Request Forgery (CSRF)