CVE-2023-46743 (GCVE-0-2023-46743)

Vulnerability from cvelistv5 – Published: 2023-11-09 15:32 – Updated: 2024-09-04 13:49
VLAI?
Summary
application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:53:21.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xwikisas:application-collabora:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "application-collabora",
            "vendor": "xwikisas",
            "versions": [
              {
                "lessThan": "1.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46743",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T13:48:07.458311Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T13:49:40.913Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "application-collabora",
          "vendor": "xwikisas",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276: Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-09T15:32:21.852Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57"
        }
      ],
      "source": {
        "advisory": "GHSA-mvq3-xxg2-rj57",
        "discovery": "UNKNOWN"
      },
      "title": "The same file cannot be opened with different rights"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-46743",
    "datePublished": "2023-11-09T15:32:21.852Z",
    "dateReserved": "2023-10-25T14:30:33.753Z",
    "dateUpdated": "2024-09-04T13:49:40.913Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xwiki:application-collabora:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.3\", \"matchCriteriaId\": \"08164BF8-B0B5-4C77-B13F-B81350B0ADAA\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3.\"}, {\"lang\": \"es\", \"value\": \"application-collabora es una integraci\\u00f3n de Collabora Online en XWiki. Como parte de los casos de uso de la aplicaci\\u00f3n, dependiendo de los derechos que tenga un usuario sobre un documento, deber\\u00eda poder abrir los archivos adjuntos de Office en modo de visualizaci\\u00f3n o edici\\u00f3n. Actualmente, si un usuario abre un archivo adjunto en modo de edici\\u00f3n en collabora, este derecho se conservar\\u00e1 para todos los usuarios futuros, hasta que se cierre la sesi\\u00f3n de edici\\u00f3n, incluso si algunos de ellos solo tienen derecho de visualizaci\\u00f3n. El servidor de Collabora es el que emite esta solicitud y parece que el par\\u00e1metro de consulta `userCanWrite` est\\u00e1 almacenado en cach\\u00e9, incluso si, por ejemplo, el token no lo est\\u00e1. Este problema se solucion\\u00f3 en la versi\\u00f3n 1.3.\"}]",
      "id": "CVE-2023-46743",
      "lastModified": "2024-11-21T08:29:12.583",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.7, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}]}",
      "published": "2023-11-09T16:15:34.683",
      "references": "[{\"url\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-46743\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-11-09T16:15:34.683\",\"lastModified\":\"2024-11-21T08:29:12.583\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3.\"},{\"lang\":\"es\",\"value\":\"application-collabora es una integraci\u00f3n de Collabora Online en XWiki. Como parte de los casos de uso de la aplicaci\u00f3n, dependiendo de los derechos que tenga un usuario sobre un documento, deber\u00eda poder abrir los archivos adjuntos de Office en modo de visualizaci\u00f3n o edici\u00f3n. Actualmente, si un usuario abre un archivo adjunto en modo de edici\u00f3n en collabora, este derecho se conservar\u00e1 para todos los usuarios futuros, hasta que se cierre la sesi\u00f3n de edici\u00f3n, incluso si algunos de ellos solo tienen derecho de visualizaci\u00f3n. El servidor de Collabora es el que emite esta solicitud y parece que el par\u00e1metro de consulta `userCanWrite` est\u00e1 almacenado en cach\u00e9, incluso si, por ejemplo, el token no lo est\u00e1. Este problema se solucion\u00f3 en la versi\u00f3n 1.3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:application-collabora:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3\",\"matchCriteriaId\":\"08164BF8-B0B5-4C77-B13F-B81350B0ADAA\"}]}]}],\"references\":[{\"url\":\"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"name\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T20:53:21.441Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-46743\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-04T13:48:07.458311Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:xwikisas:application-collabora:*:*:*:*:*:*:*:*\"], \"vendor\": \"xwikisas\", \"product\": \"application-collabora\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.3\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-04T13:49:36.882Z\"}}], \"cna\": {\"title\": \"The same file cannot be opened with different rights\", \"source\": {\"advisory\": \"GHSA-mvq3-xxg2-rj57\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"xwikisas\", \"product\": \"application-collabora\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.3\"}]}], \"references\": [{\"url\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"name\": \"https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-276\", \"description\": \"CWE-276: Incorrect Default Permissions\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-11-09T15:32:21.852Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-46743\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-04T13:49:40.913Z\", \"dateReserved\": \"2023-10-25T14:30:33.753Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-11-09T15:32:21.852Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…