{"vulnerability": "CVE-2023-4673", "sightings": [{"uuid": "c7972a83-8c38-496e-add4-e25f66c8e78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2023-46734", "type": "seen", "source": "https://gist.github.com/Rudloff/8465a35eb53f45f83311ad2230e8c0cb", "content": "", "creation_timestamp": "2025-02-16T10:21:41.000000Z"}, {"uuid": "0780ab36-6b2e-42fa-b5e9-9381276b6442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46732", "type": "seen", "source": "https://t.me/cibsecurity/73637", "content": "\u203c CVE-2023-46732 \u203c\n\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T22:26:03.000000Z"}, {"uuid": "944ea50b-8825-4d1b-b753-3adf96316915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/cibsecurity/74329", "content": "\u203c\ufe0fCVE-2023-46739\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:38.000000Z"}, {"uuid": "d10b9972-163a-45a4-9bc4-3baae47592b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46731", "type": "seen", "source": "https://t.me/cibsecurity/73631", "content": "\u203c CVE-2023-46731 \u203c\n\nXWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki doesn't properly escape the section URL parameter that is used in the code for displaying administration sections. This allows any user with read access to the document `XWiki.AdminSheet` (by default, everyone including unauthenticated users) to execute code including Groovy code. This impacts the confidentiality, integrity and availability of the whole XWiki instance. This vulnerability has been patched in XWiki 14.10.14, 15.6 RC1 and 15.5.1. Users are advised to upgrade. Users unablr to upgrade may apply the fix in commit `fec8e0e53f9` manually. Alternatively, to protect against attacks from unauthenticated users, view right for guests can be removed from this document (it is only needed for space and wiki admins).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T22:25:55.000000Z"}, {"uuid": "9d9f91f3-af94-48b6-a116-6bfb06ad3b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46738", "type": "seen", "source": "https://t.me/ctinow/162474", "content": "https://ift.tt/ycal9NF\nCVE-2023-46738", "creation_timestamp": "2024-01-03T17:26:51.000000Z"}, {"uuid": "fc3a2819-0a67-4360-b0ed-426bb66e6d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46738", "type": "seen", "source": "https://t.me/cibsecurity/74323", "content": "\u203c\ufe0fCVE-2023-46738\u203c\ufe0f\n\nCubeFS is an opensource cloudnative file storage system. A security vulnerability was found in CubeFS HandlerNode in versions prior to 3.3.1 that could allow authenticated users to send maliciouslycrafted requests that would crash the ObjectNode and deny other users from using it. The root cause was improper handling of incoming HTTP requests that could allow an attacker to control the ammount of memory that the ObjectNode would allocate. A malicious request could make the ObjectNode allocate more memory that the machine had available, and the attacker could exhaust memory by way of a single malicious request. An attacker would need to be authenticated in order to invoke the vulnerable code with their malicious request and have permissions to delete objects. In addition, the attacker would need to know the names of existing buckets of the CubeFS deployment  otherwise the request would be rejected before it reached the vulnerable code. As such, the most likely attacker is an inside user or an attacker that has breached the account of an existing user in the cluster. The issue has been patched in v3.3.1. There is no other mitigation besides upgrading.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:36:09.000000Z"}, {"uuid": "daf6e640-0703-407f-bd6e-dcb77afee49f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46738", "type": "seen", "source": "https://t.me/ctinow/172100", "content": "https://ift.tt/indxC4z\nCVE-2023-46738 | CubeFS up to 3.3.0 HandlerNode allocation of resources", "creation_timestamp": "2024-01-23T16:26:57.000000Z"}, {"uuid": "1ac0c943-035a-4062-a7a0-5294c140b80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/172308", "content": "https://ift.tt/s27QwSl\nCVE-2023-46739 | CubeFS up to 3.3.0 information exposure", "creation_timestamp": "2024-01-23T21:26:15.000000Z"}, {"uuid": "535b41d5-1e02-4ffa-8fce-de88c6384549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46738", "type": "seen", "source": "https://t.me/arpsyndicate/2482", "content": "#ExploitObserverAlert\n\nCVE-2023-46738\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46738. CubeFS is an open-source cloud-native file storage system. A security vulnerability was found in CubeFS HandlerNode in versions prior to 3.3.1 that could allow authenticated users to send maliciously-crafted requests that would crash the ObjectNode and deny other users from using it. The root cause was improper handling of incoming HTTP requests that could allow an attacker to control the ammount of memory that the ObjectNode would allocate. A malicious request could make the ObjectNode allocate more memory that the machine had available, and the attacker could exhaust memory by way of a single malicious request. An attacker would need to be authenticated in order to invoke the vulnerable code with their malicious request and have permissions to delete objects. In addition, the attacker would need to know the names of existing buckets of the CubeFS deployment - otherwise the request would be rejected before it reached the vulnerable code. As such, the most likely attacker is an inside user or an attacker that has breached the account of an existing user in the cluster. The issue has been patched in v3.3.1. There is no other mitigation besides upgrading.", "creation_timestamp": "2024-01-05T14:24:08.000000Z"}, {"uuid": "dc429448-7b97-44aa-a80b-4eb5c03258d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/arpsyndicate/2481", "content": "#ExploitObserverAlert\n\nCVE-2023-46739\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46739. CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.", "creation_timestamp": "2024-01-05T14:07:23.000000Z"}, {"uuid": "872c0871-210b-4bc5-835f-b41a5ba072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46739", "type": "seen", "source": "https://t.me/ctinow/162518", "content": "https://ift.tt/y4WEH1T\nCVE-2023-46739", "creation_timestamp": "2024-01-03T18:31:46.000000Z"}, {"uuid": "d915cc03-aa03-4fef-b524-a58f4231203d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46736", "type": "seen", "source": "https://t.me/ctinow/159040", "content": "https://ift.tt/Y5iEwy3\nCVE-2023-46736 | EspoCRM up to 8.0.4 Upload Image From URL API /Attachment/fromImageUrl server-side request forgery (GHSA-g955-rwxx-jvf6)", "creation_timestamp": "2023-12-24T15:26:22.000000Z"}]}