6.5
CVE-2023-0003
- EPSS 0.79%
- Veröffentlicht 08.02.2023 18:15:11
- Zuletzt bearbeitet 13.02.2025 17:15:52
- Quelle psirt@paloaltonetworks.com
- Teams Watchlist Login
- Unerledigt Login
A file disclosure vulnerability in the Palo Alto Networks Cortex XSOAR server software enables an authenticated user with access to the web interface to read local files from the server.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paloaltonetworks ≫ Cortex Xsoar Version >= 6.10.0 < 6.10.0.185964
Paloaltonetworks ≫ Cortex Xsoar Version6.6.0 Update2585049
Paloaltonetworks ≫ Cortex Xsoar Version6.6.0 Update2889656
Paloaltonetworks ≫ Cortex Xsoar Version6.6.0 Update3049220
Paloaltonetworks ≫ Cortex Xsoar Version6.6.0 Update3124193
Paloaltonetworks ≫ Cortex Xsoar Version6.8.0 Update176620
Paloaltonetworks ≫ Cortex Xsoar Version6.8.0 Update3261002
Paloaltonetworks ≫ Cortex Xsoar Version6.9.0 Update130766
Paloaltonetworks ≫ Cortex Xsoar Version6.9.0 Update177754
Fedoraproject ≫ Fedora Version37
Fedoraproject ≫ Fedora Version38
Fedoraproject ≫ Fedora Version39
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.79% | 0.716 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
psirt@paloaltonetworks.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-610 Externally Controlled Reference to a Resource in Another Sphere
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
CWE-73 External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.