Search criteria
9 vulnerabilities found for proself by northgrid
FKIE_CVE-2023-45727
Vulnerability from fkie_nvd - Published: 2023-10-18 10:15 - Updated: 2025-10-24 20:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN95981460/ | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.proself.jp/information/153/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN95981460/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.proself.jp/information/153/ | Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727 | US Government Resource |
{
"cisaActionDue": "2024-12-24",
"cisaExploitAdd": "2024-12-03",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:mail_sanitize:*:*:*",
"matchCriteriaId": "6D6F51B5-6B83-41C4-A1F6-9D10CB601DB5",
"versionEndExcluding": "1.09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:gateway:*:*:*",
"matchCriteriaId": "F1BB1954-50C1-40A8-9F47-415ECBB6259F",
"versionEndExcluding": "1.66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "66942ECC-2DB7-4B63-9364-FC7D71722355",
"versionEndExcluding": "5.63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:standard:*:*:*",
"matchCriteriaId": "1ED1659B-802E-4F0F-9CF3-BD1BBED1A27F",
"versionEndExcluding": "5.63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker."
},
{
"lang": "es",
"value": "Proself Enterprise/Standard Edition Ver5.62 y anteriores, Proself Gateway Edition Ver1.65 y anteriores, y Proself Mail Sanitize Edition Ver1.08 y anteriores permiten a un atacante remoto no autenticado realizar ataques de entidad externa XML (XXE). Al procesar una solicitud especialmente manipulada que contiene datos XML con formato incorrecto, el atacante puede leer archivos arbitrarios en el servidor que contienen informaci\u00f3n de la cuenta."
}
],
"id": "CVE-2023-45727",
"lastModified": "2025-10-24T20:48:10.040",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-10-18T10:15:08.643",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN95981460/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/153/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN95981460/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/153/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-39415
Vulnerability from fkie_nvd - Published: 2023-08-18 10:15 - Updated: 2024-11-21 08:15
Severity ?
Summary
Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN19661362/ | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.proself.jp/information/149/ | Vendor Advisory | |
| vultures@jpcert.or.jp | https://www.proself.jp/information/150/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN19661362/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.proself.jp/information/149/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.proself.jp/information/150/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:mail_sanitize:*:*:*",
"matchCriteriaId": "08080859-2BE8-4E98-A71F-55B05FFF34CD",
"versionEndIncluding": "1.07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:gateway:*:*:*",
"matchCriteriaId": "62F99405-78A1-4911-8731-AF45ACCEC028",
"versionEndIncluding": "1.62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "FFCCF32A-D960-4A11-BAE5-253BDED708E6",
"versionEndIncluding": "5.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:standard:*:*:*",
"matchCriteriaId": "EDA2D322-61CB-4252-912E-2DAA674DF9B6",
"versionEndIncluding": "5.61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product\u0027s Control Panel and perform an unintended operation."
},
{
"lang": "es",
"value": "Una vulnerabilidad de autenticaci\u00f3n incorrecta en Proself Enterprise/Standard Edition Ver5.61 y anteriores, Proself Gateway Edition Ver1.62 y anteriores, y Proself Mail Sanitize Edition Ver1.07 y anteriores permite a un atacante remoto no autenticado iniciar sesi\u00f3n en el Panel de control del producto y realizar una operaci\u00f3n no deseada.\n"
}
],
"id": "CVE-2023-39415",
"lastModified": "2024-11-21T08:15:22.563",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-18T10:15:11.620",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/149/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/150/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/149/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/150/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-39416
Vulnerability from fkie_nvd - Published: 2023-08-18 10:15 - Updated: 2024-11-21 08:15
Severity ?
Summary
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN19661362/ | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.proself.jp/information/149/ | Vendor Advisory | |
| vultures@jpcert.or.jp | https://www.proself.jp/information/150/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN19661362/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.proself.jp/information/149/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.proself.jp/information/150/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:mail_sanitize:*:*:*",
"matchCriteriaId": "08080859-2BE8-4E98-A71F-55B05FFF34CD",
"versionEndIncluding": "1.07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:gateway:*:*:*",
"matchCriteriaId": "62F99405-78A1-4911-8731-AF45ACCEC028",
"versionEndIncluding": "1.62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "FFCCF32A-D960-4A11-BAE5-253BDED708E6",
"versionEndIncluding": "5.61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:standard:*:*:*",
"matchCriteriaId": "EDA2D322-61CB-4252-912E-2DAA674DF9B6",
"versionEndIncluding": "5.61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands."
},
{
"lang": "es",
"value": "Proself Enterprise/Standard Edition Ver5.61 y anteriores, Proself Gateway Edition Ver1.62 y anteriores, y Proself Mail Sanitize Edition Ver1.07 y anteriores permiten a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios del sistema operativo.\n"
}
],
"id": "CVE-2023-39416",
"lastModified": "2024-11-21T08:15:22.693",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-18T10:15:11.887",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/149/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/150/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/149/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.proself.jp/information/150/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-45727 (GCVE-0-2023-45727)
Vulnerability from cvelistv5 – Published: 2023-10-18 09:01 – Updated: 2025-10-21 23:05
VLAI?
Summary
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
Severity ?
7.5 (High)
CWE
- XML external entities (XXE)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.62 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:29:32.421Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/153/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN95981460/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:enterprise:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "5.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:gateway:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "1.65",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:standard:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "5.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:mail_sanitize:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "1.08",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-45727",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-06T04:55:30.434626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2024-12-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:34.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-12-03T00:00:00+00:00",
"value": "CVE-2023-45727 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.62 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.65 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.08 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "XML external entities (XXE)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-18T09:01:12.285Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/153/"
},
{
"url": "https://jvn.jp/en/jp/JVN95981460/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-45727",
"datePublished": "2023-10-18T09:01:12.285Z",
"dateReserved": "2023-10-11T07:32:42.029Z",
"dateUpdated": "2025-10-21T23:05:34.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-39416 (GCVE-0-2023-39416)
Vulnerability from cvelistv5 – Published: 2023-08-18 09:26 – Updated: 2024-10-09 14:10
VLAI?
Summary
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
Severity ?
No CVSS data available.
CWE
- OS command injection
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.61 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.822Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/149/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/150/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_enterprise_standard_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_enterprise_standard_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "5.61",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_gateway_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_gateway_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "1.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_mail_sanitize_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_mail_sanitize_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "1.07",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39416",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T14:06:47.746548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-09T14:10:56.901Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.61 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.62 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.07 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS command injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-18T09:26:31.152Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/149/"
},
{
"url": "https://www.proself.jp/information/150/"
},
{
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-39416",
"datePublished": "2023-08-18T09:26:31.152Z",
"dateReserved": "2023-08-01T01:06:32.263Z",
"dateUpdated": "2024-10-09T14:10:56.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-39415 (GCVE-0-2023-39415)
Vulnerability from cvelistv5 – Published: 2023-08-18 09:26 – Updated: 2024-10-08 16:16
VLAI?
Summary
Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.
Severity ?
No CVSS data available.
CWE
- Improper authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.61 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.423Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/149/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/150/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:northgrid:proself_enterprise_standard_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_enterprise_standard_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "5.61",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself_gateway_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_gateway_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "1.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself_mail_sanitize_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_mail_sanitize_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "1.07",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39415",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T16:13:41.089575Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T16:16:41.532Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.61 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.62 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.07 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product\u0027s Control Panel and perform an unintended operation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-18T09:26:24.246Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/149/"
},
{
"url": "https://www.proself.jp/information/150/"
},
{
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-39415",
"datePublished": "2023-08-18T09:26:24.246Z",
"dateReserved": "2023-08-01T01:06:32.262Z",
"dateUpdated": "2024-10-08T16:16:41.532Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-45727 (GCVE-0-2023-45727)
Vulnerability from nvd – Published: 2023-10-18 09:01 – Updated: 2025-10-21 23:05
VLAI?
Summary
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
Severity ?
7.5 (High)
CWE
- XML external entities (XXE)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.62 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:29:32.421Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/153/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN95981460/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:enterprise:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "5.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:gateway:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "1.65",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:standard:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "5.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself:-:*:*:*:mail_sanitize:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself",
"vendor": "northgrid",
"versions": [
{
"lessThanOrEqual": "1.08",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-45727",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-06T04:55:30.434626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2024-12-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:34.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-45727"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-12-03T00:00:00+00:00",
"value": "CVE-2023-45727 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.62 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.65 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.08 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "XML external entities (XXE)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-18T09:01:12.285Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/153/"
},
{
"url": "https://jvn.jp/en/jp/JVN95981460/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-45727",
"datePublished": "2023-10-18T09:01:12.285Z",
"dateReserved": "2023-10-11T07:32:42.029Z",
"dateUpdated": "2025-10-21T23:05:34.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-39416 (GCVE-0-2023-39416)
Vulnerability from nvd – Published: 2023-08-18 09:26 – Updated: 2024-10-09 14:10
VLAI?
Summary
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
Severity ?
No CVSS data available.
CWE
- OS command injection
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.61 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.822Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/149/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/150/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_enterprise_standard_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_enterprise_standard_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "5.61",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_gateway_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_gateway_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "1.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:north_grid_corporation:proself_mail_sanitize_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_mail_sanitize_edition",
"vendor": "north_grid_corporation",
"versions": [
{
"lessThan": "1.07",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39416",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T14:06:47.746548Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-09T14:10:56.901Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.61 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.62 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.07 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS command injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-18T09:26:31.152Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/149/"
},
{
"url": "https://www.proself.jp/information/150/"
},
{
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-39416",
"datePublished": "2023-08-18T09:26:31.152Z",
"dateReserved": "2023-08-01T01:06:32.263Z",
"dateUpdated": "2024-10-09T14:10:56.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-39415 (GCVE-0-2023-39415)
Vulnerability from nvd – Published: 2023-08-18 09:26 – Updated: 2024-10-08 16:16
VLAI?
Summary
Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.
Severity ?
No CVSS data available.
CWE
- Improper authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| North Grid Corporation | Proself Enterprise/Standard Edition |
Affected:
Ver5.61 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.423Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/149/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.proself.jp/information/150/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:northgrid:proself_enterprise_standard_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_enterprise_standard_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "5.61",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself_gateway_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_gateway_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "1.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:northgrid:proself_mail_sanitize_edition:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "proself_mail_sanitize_edition",
"vendor": "northgrid",
"versions": [
{
"lessThan": "1.07",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39415",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T16:13:41.089575Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T16:16:41.532Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Proself Enterprise/Standard Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver5.61 and earlier"
}
]
},
{
"product": "Proself Gateway Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.62 and earlier"
}
]
},
{
"product": "Proself Mail Sanitize Edition",
"vendor": "North Grid Corporation",
"versions": [
{
"status": "affected",
"version": "Ver1.07 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product\u0027s Control Panel and perform an unintended operation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper authentication",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-18T09:26:24.246Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.proself.jp/information/149/"
},
{
"url": "https://www.proself.jp/information/150/"
},
{
"url": "https://jvn.jp/en/jp/JVN19661362/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-39415",
"datePublished": "2023-08-18T09:26:24.246Z",
"dateReserved": "2023-08-01T01:06:32.262Z",
"dateUpdated": "2024-10-08T16:16:41.532Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}