First published: Tue Dec 12 2023(Updated: )
Archer Platform 6.x before 6.13 P2 (6.13.0.2) contains an authenticated HTML content injection vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RSA Archer | >=6.0.0<6.14.0 | |
RSA Archer | <6.13.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48642 is rated as medium with a CVSS score of 5.4.
To mitigate CVE-2023-48642, it is recommended to update the Archer Platform to version 6.13 P2 (6.13.0.2) or later.