CWE
918
Advisory Published
Updated

CVE-2023-28824: SSRF

First published: Thu Jun 01 2023(Updated: )

Server-side request forgery vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may bypass the database restriction set on the query setting page, and connect to a user unintended database.

Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp

Affected SoftwareAffected VersionHow to fix
Contec CONPROSYS HMI System (CHS)<3.5.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-28824?

    CVE-2023-28824 is classified as a high severity vulnerability.

  • How do I fix CVE-2023-28824?

    To fix CVE-2023-28824, upgrade to CONPROSYS HMI System version 3.5.3 or later.

  • Who is affected by CVE-2023-28824?

    Users with administrative privileges on versions prior to 3.5.3 of the CONPROSYS HMI System are affected.

  • What kind of vulnerability is CVE-2023-28824?

    CVE-2023-28824 is a server-side request forgery (SSRF) vulnerability.

  • What could an attacker do with CVE-2023-28824?

    An attacker could bypass database restrictions and connect to unintended databases.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203