Latest Vulnerabilities Updates: AppSecWorld's CVE Daily Digest for December 16-17, 2023

In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between December 16-17, 2023.
During this period, The National Vulnerability Database published 20, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:

Critical: 0
High: 4
Medium: 8
Low: 0
Severity Not Assigned: 8

Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.

1. CVE-2023-39340
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker can send a specific request which may lead to Denial of Service (DoS) of the appliance.
References: https://forums.ivanti.com/s/article/Security-fix-release-Ivanti-Connect-Secure-22-6R2-and-22-6R2-1?language=en_US

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

2. CVE-2023-6848
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.4
Description: A vulnerability was found in kalcaddle kodbox up to 1.48. It has been declared as critical. Affected by this vulnerability is the function check of the file plugins/officeViewer/controller/libreOffice/index.class.php. The manipulation of the argument soffice leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The identifier of the patch is 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. The identifier VDB-248209 was assigned to this vulnerability.
References: https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c
https://github.com/kalcaddle/kodbox/releases/tag/1.48.04
https://note.zhaoj.in/share/pf838kAzQyTQ
https://vuldb.com/?ctiid.248209
https://vuldb.com/?id.248209

CWE-ID: CWE-77
Common Platform Enumerations (CPE): Not Found

3. CVE-2023-6849
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.4
Description: A vulnerability was found in kalcaddle kodbox up to 1.48. It has been rated as critical. Affected by this issue is the function cover of the file plugins/fileThumb/app.php. The manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The patch is identified as 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. VDB-248210 is the identifier assigned to this vulnerability.
References: https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c
https://github.com/kalcaddle/kodbox/releases/tag/1.48.04
https://note.zhaoj.in/share/jSsPAWT1pKsq
https://vuldb.com/?ctiid.248210
https://vuldb.com/?id.248210

CWE-ID: CWE-918
Common Platform Enumerations (CPE): Not Found

4. CVE-2023-6559
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 3.9
Impact Score: 3.6
Description: The MW WP Form plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 5.0.3. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.
References: https://plugins.trac.wordpress.org/changeset/3007879/mw-wp-form
https://www.wordfence.com/threat-intel/vulnerabilities/id/412d555c-9bbd-42f5-8020-ccfc18755a79?source=cve

CWE-ID: Not assigned as of now
Common Platform Enumerations (CPE): Not Found

Previous Post Next Post

Contact Form