CVE-2023-36647
- EPSS 0.07%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:11
A hard-coded cryptographic private key used to sign JWT authentication tokens in ProLion CryptoSpike 3.0.15P2 allows remote attackers to impersonate arbitrary users and roles in web management and REST API endpoints via crafted JWT tokens.
CVE-2023-36648
- EPSS 0.59%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:12
Missing authentication in the internal data streaming system in ProLion CryptoSpike 3.0.15P2 allows remote unauthenticated users to read potentially sensitive information and deny service to users by directly reading and writing data in Apache Kafka ...
CVE-2023-36649
- EPSS 0.1%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:12
Insertion of sensitive information in the centralized (Grafana) logging system in ProLion CryptoSpike 3.0.15P2 allows remote attackers to impersonate other users in web management and the REST API by reading JWT tokens from logs (as a Granafa authent...
CVE-2023-36650
- EPSS 0.06%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:12
A missing integrity check in the update system in ProLion CryptoSpike 3.0.15P2 allows attackers to execute OS commands as the root Linux user on the host system via forged update packages.
CVE-2023-36651
- EPSS 0.28%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:12
Hidden and hard-coded credentials in ProLion CryptoSpike 3.0.15P2 allow remote attackers to login to web management as super-admin and consume the most privileged REST API endpoints via these credentials.
CVE-2023-36652
- EPSS 0.05%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 27.05.2025 15:15:30
A SQL Injection in the users searching REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to read database data via SQL commands injected in the search parameter.
CVE-2023-36654
- EPSS 0.22%
- Veröffentlicht 12.12.2023 01:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:13
Directory traversal in the log-download REST API endpoint in ProLion CryptoSpike 3.0.15P2 allows remote authenticated attackers to download host server SSH private keys (associated with a Linux root user) by injecting paths inside REST API endpoint p...
CVE-2023-36646
- EPSS 0.34%
- Veröffentlicht 12.12.2023 00:15:28
- Zuletzt bearbeitet 21.11.2024 08:10:10
Incorrect user role checking in multiple REST API endpoints in ProLion CryptoSpike 3.0.15P2 allows a remote attacker with low privileges to execute privileged functions and achieve privilege escalation via REST API endpoint invocation.
CVE-2023-36655
- EPSS 0.11%
- Veröffentlicht 06.12.2023 16:15:07
- Zuletzt bearbeitet 21.11.2024 08:10:13
The login REST API in ProLion CryptoSpike 3.0.15P2 (when LDAP or Active Directory is used as the users store) allows a remote blocked user to login and obtain an authentication token by specifying a username with different uppercase/lowercase charact...