First published: Fri Jun 30 2023(Updated: )
MISP 2.4.172 mishandles different certificate file extensions in server sync. An attacker can obtain sensitive information because of the nature of the error messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Misp-project Malware Information Sharing Platform | =2.4.172 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-37306.
The severity of CVE-2023-37306 is high (7.5).
MISP 2.4.172 mishandles different certificate file extensions in server sync, allowing an attacker to obtain sensitive information through error messages.
An attacker can exploit CVE-2023-37306 by leveraging the mishandling of certificate file extensions in MISP 2.4.172 server sync to obtain sensitive information.
Yes, you can find more information about CVE-2023-37306 at the following references: [Link 1](https://github.com/MISP/MISP/commit/f125630c1c2d0f5d11079d3653ab7bb2ab5cd908), [Link 2](https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle).