First published: Tue Dec 12 2023(Updated: )
Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer | <6.14.0.1.2 | |
RSA Archer | <6.13.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48641 is considered a medium severity vulnerability due to its potential for exploitation in multi-instance Archer platforms.
To mitigate CVE-2023-48641, upgrade your Archer platform to version 6.14 P1 HF2 or later.
CVE-2023-48641 affects authenticated users of Archer Platform versions prior to 6.14.0.1.2.
CVE-2023-48641 is classified as an insecure direct object reference vulnerability.
An attacker exploiting CVE-2023-48641 could manipulate resource references to bypass authorization controls.