Latest Vulnerabilities Updates: AppSecWorld's CVE Daily Digest for December 11-12, 2023

In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between December 11-12, 2023.
During this period, The National Vulnerability Database published 38, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:

Critical: 1
High: 5
Medium: 9
Low: 1
Severity Not Assigned: 22

Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.

1. CVE-2023-5500
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
References: https://cert.vde.com/en/advisories/VDE-2023-049/

CWE-ID: CWE-94
Common Platform Enumerations (CPE): Not Found

2. CVE-2023-6185
Base Score: 8.3
Base Severity: HIGH
Exploitability Score: 1.7
Impact Score: 6.0
Description: Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.

In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.


References: https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

3. CVE-2023-6186
Base Score: 8.3
Base Severity: HIGH
Exploitability Score: 1.7
Impact Score: 6.0
Description: Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.

In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.



References: https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

4. CVE-2023-6538
Base Score: 7.6
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 4.7
Description: SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles.
References: https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_is_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_SMU_configuration_backup_data

CWE-ID: CWE-285
Common Platform Enumerations (CPE): Not Found

5. CVE-2023-49803
Base Score: 8.6
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 4.0
Description: @koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. Prior to version 5.0.0, the middleware operates in a way that if an allowed origin is not provided, it will return an `Access-Control-Allow-Origin` header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware. If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it. Version 5.0.0 fixes this vulnerability.
References: https://github.com/koajs/cors/commit/f31dac99f5355c41e7d4dd3c4a80c5f154941a11
https://github.com/koajs/cors/security/advisories/GHSA-qxrj-hx23-xp82

CWE-ID: CWE-346
Common Platform Enumerations (CPE): Not Found

6. CVE-2023-50245
Base Score: 9.8
Base Severity: CRITICAL
Exploitability Score: 3.9
Impact Score: 5.9
Description: OpenEXR-viewer is a viewer for OpenEXR files with detailed metadata probing. Versions prior to 0.6.1 have a memory overflow vulnerability. This issue is fixed in version 0.6.1.
References: https://github.com/afichet/openexr-viewer/commit/d0a7e85dfeb519951fb8a8d70f73f30d41cdd3d9
https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj

CWE-ID: CWE-120
Common Platform Enumerations (CPE): Not Found

Previous Post Next Post

Contact Form