cve-2023-29288
Vulnerability from cvelistv5
Published
2023-06-15 00:00
Modified
2024-09-17 11:11
Severity ?
EPSS score ?
Summary
Adobe Commerce | Incorrect Authorization (CWE-863)
References
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | https://helpx.adobe.com/security/products/magento/apsb23-35.html | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Adobe | Adobe Commerce |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://helpx.adobe.com/security/products/magento/apsb23-35.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Adobe Commerce", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "2.4.4-p3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-06-13T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user\u0027s data. Exploitation of this issue does not require user interaction." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 4.3, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "LOW", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "NETWORK", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "NONE", "modifiedIntegrityImpact": "LOW", "modifiedPrivilegesRequired": "LOW", "modifiedScope": "UNCHANGED", "modifiedUserInteraction": "NONE", "privilegesRequired": "LOW", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 4.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "Incorrect Authorization (CWE-863)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T11:11:32.577Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/magento/apsb23-35.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Commerce | Incorrect Authorization (CWE-863)" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-29288", "datePublished": "2023-06-15T00:00:00", "dateReserved": "2023-04-04T00:00:00", "dateUpdated": "2024-09-17T11:11:32.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-29288\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2023-06-15T19:15:10.673\",\"lastModified\":\"2023-06-22T15:42:05.263\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user\u0027s data. Exploitation of this issue does not require user interaction.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4346BF61-743B-4BBE-AC90-9954FEE6E943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F471E19-8AFE-4A6C-88EA-DF94428518F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E5B990-1E1C-46AC-815F-AF737D211C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1598F4-AA41-4F94-A986-E603DC42AC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A3535F6-227F-4DD2-881F-9ADAB68373CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*\",\"matchCriteriaId\":\"428B889D-3BAF-46A2-913A-E0022217F804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0A7F6F-6218-4714-A7C7-79580FBA8FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D845F99F-2958-4118-B27E-6D84602B7FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61266FCB-916E-4B72-A5CE-8E9D3D817996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B4BB14A-5BBE-4FF3-B956-306D721D99E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BCDF10-D4D2-4FB5-8A6A-960730C17911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F747F9C6-BD3F-4DFC-BC91-6361F66E50D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BF6A4C-BC58-40A2-AE21-B4F309562661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0E8BC4-17BD-4F42-A849-2CC439CF82D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B503C35-8C90-4A24-8E60-722CDBBF556B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC5B997C-8DB4-4FDF-96F6-6DCF23970705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D258D9EF-94FB-41F0-A7A5-7F66FA7A0055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5CF6F0-2388-4D3F-8FE1-43B8AF148564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEBDDF2-6443-4482-83B2-3CD272CF599F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B07F7B2-E915-4EFF-8FFC-91143CEF082E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8605E4E6-0F7D-42C8-B35B-2349A0BEFC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"AC641EFE-3B9B-4988-A143-FE1F6FD0D689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"5F7AA4A6-69E3-4BA4-A476-CA37F41D5482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"A3D05570-FA72-4FCF-90E9-EC19731CD9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"7DF079F1-1886-4974-A0F0-82DEA88F2E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"7A41C717-4B9F-4972-ABA3-2294EEC20F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"3FA80BBC-2DF2-46E1-84CE-8A899415114E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"510B1840-AE77-4BDD-9C09-26C64CC8FC81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"789BD987-9DAD-4EAE-93DE-0E267D54F124\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb23-35.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.