Catalis (previously Icon Software) CMS360 allows a remote, unauthenticated attacker to view sensitive court documents by modifying document and other identifiers in URLs. The impact varies based on the intention and configuration of a specific CMS360 installation.
References
Link | Resource |
---|---|
https://catalisgov.com/courts-land-records-support/ | Product |
https://github.com/qwell/disorder-in-the-court/blob/main/README-Catalis.md | Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Third Party Advisory |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
https://catalisgov.com/courts-land-records-support/ | Product |
https://github.com/qwell/disorder-in-the-court/blob/main/README-Catalis.md | Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Third Party Advisory |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://catalisgov.com/courts-land-records-support/ - Product | |
References | () https://github.com/qwell/disorder-in-the-court/blob/main/README-Catalis.md - Third Party Advisory | |
References | () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Third Party Advisory | |
References | () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource |
08 Dec 2023, 15:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:catalisgov:cms360:-:*:*:*:*:*:*:* | |
CWE | CWE-639 | |
References | () https://github.com/qwell/disorder-in-the-court/blob/main/README-Catalis.md - Third Party Advisory | |
References | () https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ - Third Party Advisory | |
References | () https://catalisgov.com/courts-land-records-support/ - Product | |
References | () https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems - Third Party Advisory, US Government Resource |
30 Nov 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Nov 2023, 18:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-30 18:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6341
Mitre link : CVE-2023-6341
CVE.ORG link : CVE-2023-6341
JSON object : View
Products Affected
catalisgov
- cms360
CWE
CWE-639
Authorization Bypass Through User-Controlled Key