CVE-2023-7248 (GCVE-0-2023-7248)

Vulnerability from cvelistv5 – Published: 2024-03-15 19:30 – Updated: 2024-08-02 08:57
VLAI?
Summary
Certain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.  The vulnerability would affect one of Vertica’s authentication functionalities by allowing specially crafted requests and sequences. This issue impacts the following Vertica Management Console versions: 10.x 11.1.1-24 or lower 12.0.4-18 or lower Please upgrade to one of the following Vertica Management Console versions: 10.x to upgrade to latest versions from below. 11.1.1-25 12.0.4-19 23.x 24.x
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Opentext Vertica Management Console Affected: 10.x
Affected: 11.x , ≤ 11.1.1-24 (custom)
Affected: 12.x , ≤ 12.0.4-18 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:opentext:vertica_management_console:10.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vertica_management_console",
            "vendor": "opentext",
            "versions": [
              {
                "lessThan": "11.0",
                "status": "affected",
                "version": "10.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:opentext:vertica_management_console:11.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vertica_management_console",
            "vendor": "opentext",
            "versions": [
              {
                "lessThanOrEqual": "11.1.1-24",
                "status": "affected",
                "version": "11.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:opentext:vertica_management_console:12.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vertica_management_console",
            "vendor": "opentext",
            "versions": [
              {
                "lessThanOrEqual": "12.0.4-18",
                "status": "affected",
                "version": "12.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-7248",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-18T14:06:10.703241Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-25T16:48:47.101Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.microfocus.com/s/article/KM000027542?language=en_US"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Vertica Management Console",
          "vendor": "Opentext",
          "versions": [
            {
              "status": "affected",
              "version": "10.x"
            },
            {
              "lessThanOrEqual": "11.1.1-24",
              "status": "affected",
              "version": "11.x",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.0.4-18",
              "status": "affected",
              "version": "12.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-03-12T19:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cstrong\u003eCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\u0026nbsp;\u003cbr\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cstrong\u003eThe vulnerability would affect one of Vertica\u2019s authentication functionalities by allowing specially crafted requests and sequences. \u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cstrong\u003eThis issue impacts the following Vertica Management Console versions:\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cstrong\u003e10.x\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cstrong\u003e11.1.1-24 or lower\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cstrong\u003e12.0.4-18 or lower\u003c/strong\u003e\u003c/span\u003e\n\n\u003cbr\u003e\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePlease upgrade to one of the following Vertica Management Console versions:\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e10.x to upgrade to latest versions from below.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e11.1.1-25\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e12.0.4-19\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e23.x\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e24.x\u003c/span\u003e\n\n\u003c/strong\u003e\n\n\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "\nCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\u00a0\n\nThe vulnerability would affect one of Vertica\u2019s authentication functionalities by allowing specially crafted requests and sequences. \nThis issue impacts the following Vertica Management Console versions:\n10.x\n11.1.1-24 or lower\n12.0.4-18 or lower\n\nPlease upgrade to one of the following Vertica Management Console versions:\n10.x to upgrade to latest versions from below.\n11.1.1-25\n12.0.4-19\n23.x\n24.x\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-140",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-140 Bypassing of Intermediate Forms in Multiple-Form Sets"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-15T19:30:27.419Z",
        "orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
        "shortName": "OpenText"
      },
      "references": [
        {
          "url": "https://portal.microfocus.com/s/article/KM000027542?language=en_US"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cbr\u003e\u003cbr\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.microfocus.com/s/article/KM000027542?language=en_US\"\u003ehttps://portal.microfocus.com/s/article/KM000027542?language=en_US\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "\n https://portal.microfocus.com/s/article/KM000027542?language=en_US \n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OpenText Vertica Management console might be prone to bypass via crafted requests",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
    "assignerShortName": "OpenText",
    "cveId": "CVE-2023-7248",
    "datePublished": "2024-03-15T19:30:27.419Z",
    "dateReserved": "2024-02-26T17:58:17.863Z",
    "dateUpdated": "2024-08-02T08:57:35.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0.0-0\", \"versionEndIncluding\": \"10.1.1-26\", \"matchCriteriaId\": \"056D6A40-95C6-4FEA-91C9-B5C41AE254C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0-0\", \"versionEndExcluding\": \"11.1.1-25\", \"matchCriteriaId\": \"C15386AE-A142-4A50-9B64-276C2FC3E959\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0-0\", \"versionEndExcluding\": \"12.0.4-19\", \"matchCriteriaId\": \"84FC2248-AAC2-4994-BBB3-6705EAB9934B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"\\nCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\\u00a0\\n\\nThe vulnerability would affect one of Vertica\\u2019s authentication functionalities by allowing specially crafted requests and sequences. \\nThis issue impacts the following Vertica Management Console versions:\\n10.x\\n11.1.1-24 or lower\\n12.0.4-18 or lower\\n\\nPlease upgrade to one of the following Vertica Management Console versions:\\n10.x to upgrade to latest versions from below.\\n11.1.1-25\\n12.0.4-19\\n23.x\\n24.x\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Ciertas funciones en la consola de OpenText Vertica Management pueden ser propensas a omitirse mediante solicitudes manipuladas. La vulnerabilidad afectar\\u00eda una de las funcionalidades de autenticaci\\u00f3n de Vertica al permitir solicitudes y secuencias especialmente manipuladas. Este problema afecta las siguientes versiones de Vertica Management Console: 10.x 11.1.1-24 o anterior 12.0.4-18 o anterior Actualice a una de las siguientes versiones de Vertica Management Console: 10.x para actualizar a las \\u00faltimas versiones desde abajo. 11.1.1-25 12.0.4-19 23.x 24.x\"}]",
      "id": "CVE-2023-7248",
      "lastModified": "2024-11-21T08:45:36.437",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@opentext.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L\", \"baseScore\": 5.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 2.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2024-03-15T20:15:07.280",
      "references": "[{\"url\": \"https://portal.microfocus.com/s/article/KM000027542?language=en_US\", \"source\": \"security@opentext.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://portal.microfocus.com/s/article/KM000027542?language=en_US\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@opentext.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@opentext.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-7248\",\"sourceIdentifier\":\"security@opentext.com\",\"published\":\"2024-03-15T20:15:07.280\",\"lastModified\":\"2024-11-21T08:45:36.437\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\u00a0\\n\\nThe vulnerability would affect one of Vertica\u2019s authentication functionalities by allowing specially crafted requests and sequences. \\nThis issue impacts the following Vertica Management Console versions:\\n10.x\\n11.1.1-24 or lower\\n12.0.4-18 or lower\\n\\nPlease upgrade to one of the following Vertica Management Console versions:\\n10.x to upgrade to latest versions from below.\\n11.1.1-25\\n12.0.4-19\\n23.x\\n24.x\\n\\n\"},{\"lang\":\"es\",\"value\":\"Ciertas funciones en la consola de OpenText Vertica Management pueden ser propensas a omitirse mediante solicitudes manipuladas. La vulnerabilidad afectar\u00eda una de las funcionalidades de autenticaci\u00f3n de Vertica al permitir solicitudes y secuencias especialmente manipuladas. Este problema afecta las siguientes versiones de Vertica Management Console: 10.x 11.1.1-24 o anterior 12.0.4-18 o anterior Actualice a una de las siguientes versiones de Vertica Management Console: 10.x para actualizar a las \u00faltimas versiones desde abajo. 11.1.1-25 12.0.4-19 23.x 24.x\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@opentext.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0-0\",\"versionEndIncluding\":\"10.1.1-26\",\"matchCriteriaId\":\"056D6A40-95C6-4FEA-91C9-B5C41AE254C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0-0\",\"versionEndExcluding\":\"11.1.1-25\",\"matchCriteriaId\":\"C15386AE-A142-4A50-9B64-276C2FC3E959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0-0\",\"versionEndExcluding\":\"12.0.4-19\",\"matchCriteriaId\":\"84FC2248-AAC2-4994-BBB3-6705EAB9934B\"}]}]}],\"references\":[{\"url\":\"https://portal.microfocus.com/s/article/KM000027542?language=en_US\",\"source\":\"security@opentext.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://portal.microfocus.com/s/article/KM000027542?language=en_US\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://portal.microfocus.com/s/article/KM000027542?language=en_US\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T08:57:35.093Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-7248\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-18T14:06:10.703241Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:opentext:vertica_management_console:10.0:*:*:*:*:*:*:*\"], \"vendor\": \"opentext\", \"product\": \"vertica_management_console\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0\", \"lessThan\": \"11.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:opentext:vertica_management_console:11.0:*:*:*:*:*:*:*\"], \"vendor\": \"opentext\", \"product\": \"vertica_management_console\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.1.1-24\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:opentext:vertica_management_console:12.0:*:*:*:*:*:*:*\"], \"vendor\": \"opentext\", \"product\": \"vertica_management_console\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"12.0.4-18\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-25T16:48:43.297Z\"}}], \"cna\": {\"title\": \"OpenText Vertica Management console might be prone to bypass via crafted requests\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-140\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-140 Bypassing of Intermediate Forms in Multiple-Form Sets\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Opentext\", \"product\": \"Vertica Management Console\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.x\"}, {\"status\": \"affected\", \"version\": \"11.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.1.1-24\"}, {\"status\": \"affected\", \"version\": \"12.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"12.0.4-18\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"\\n https://portal.microfocus.com/s/article/KM000027542?language=en_US \\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cbr\u003e\u003cbr\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://portal.microfocus.com/s/article/KM000027542?language=en_US\\\"\u003ehttps://portal.microfocus.com/s/article/KM000027542?language=en_US\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-03-12T19:00:00.000Z\", \"references\": [{\"url\": \"https://portal.microfocus.com/s/article/KM000027542?language=en_US\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\\u00a0\\n\\nThe vulnerability would affect one of Vertica\\u2019s authentication functionalities by allowing specially crafted requests and sequences. \\nThis issue impacts the following Vertica Management Console versions:\\n10.x\\n11.1.1-24 or lower\\n12.0.4-18 or lower\\n\\nPlease upgrade to one of the following Vertica Management Console versions:\\n10.x to upgrade to latest versions from below.\\n11.1.1-25\\n12.0.4-19\\n23.x\\n24.x\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cstrong\u003eCertain functionality in OpenText Vertica Management console might be prone to bypass via crafted requests.\u0026nbsp;\u003cbr\u003e\u003cbr\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cstrong\u003eThe vulnerability would affect one of Vertica\\u2019s authentication functionalities by allowing specially crafted requests and sequences. \u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cstrong\u003eThis issue impacts the following Vertica Management Console versions:\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cstrong\u003e10.x\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cstrong\u003e11.1.1-24 or lower\u003c/strong\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cstrong\u003e12.0.4-18 or lower\u003c/strong\u003e\u003c/span\u003e\\n\\n\u003cbr\u003e\u003cbr\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003ePlease upgrade to one of the following Vertica Management Console versions:\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e10.x to upgrade to latest versions from below.\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e11.1.1-25\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e12.0.4-19\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e23.x\u003c/span\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e24.x\u003c/span\u003e\\n\\n\u003c/strong\u003e\\n\\n\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"f81092c5-7f14-476d-80dc-24857f90be84\", \"shortName\": \"OpenText\", \"dateUpdated\": \"2024-03-15T19:30:27.419Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-7248\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T08:57:35.093Z\", \"dateReserved\": \"2024-02-26T17:58:17.863Z\", \"assignerOrgId\": \"f81092c5-7f14-476d-80dc-24857f90be84\", \"datePublished\": \"2024-03-15T19:30:27.419Z\", \"assignerShortName\": \"OpenText\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…