First published: Tue Jun 27 2023(Updated: )
Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
maven/net.sourceforge.plantuml:plantuml-mit | <1.2023.9 | 1.2023.9 |
Plantuml Plantuml | <1.2023.9 | |
Fedoraproject Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3431 refers to the vulnerability titled 'Improper Access Control' in the GitHub repository plantuml/plantuml prior to version 1.2023.9.
CVE-2023-3431 has a severity level of 5.3 (Medium).
CVE-2023-3431 affects the GitHub repository plantuml/plantuml prior to version 1.2023.9 and the Maven package 'net.sourceforge.plantuml:plantuml-mit' up to version 1.2023.9.
To fix CVE-2023-3431, you should update the affected software to version 1.2023.9 or later.
You can find more information about CVE-2023-3431 at the following references: [Reference 1](https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e), [Reference 2](https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/).