First published: Wed Dec 13 2023(Updated: )
The notification/messaging feature of Silverpeas Core 6.3.1 does not enforce access control on the ID parameter. This allows an attacker to read all messages sent between other users; including those sent only to administrators.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.silverpeas.core:silverpeas-core-web | <6.3.2 | 6.3.2 |
maven/org.silverpeas.core:silverpeas-core-api | <6.3.2 | 6.3.2 |
Silverpeas Core | <6.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47323 is classified as a high severity vulnerability due to its potential to expose sensitive message data to unauthorized users.
To mitigate CVE-2023-47323, upgrade to Silverpeas Core version 6.3.2 or later, which implements proper access control.
CVE-2023-47323 allows attackers to read messages exchanged between users, including messages intended only for administrators.
CVE-2023-47323 affects Silverpeas Core versions prior to 6.3.2.
Any users of Silverpeas Core 6.3.1 or earlier are at risk, especially those who exchange sensitive messages.