Lucene search

K
cve[email protected]CVE-2023-23835
HistoryFeb 14, 2023 - 11:15 a.m.

CVE-2023-23835

2023-02-1411:15:14
CWE-284
web.nvd.nist.gov
23
mendix
application
vulnerability
xpath
constraint
information security
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.4%

A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (All versions < V9.22.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.10), Mendix Applications using Mendix 9 (V9.18) (All versions < V9.18.4), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.15). Some of the Mendix runtime API’s allow attackers to bypass XPath constraints and retrieve information using XPath queries that trigger errors.

Affected configurations

NVD
Node
mendixmendixRange7.0.27.23.34
OR
mendixmendixRange8.0.08.18.23
OR
mendixmendixRange9.0.09.6.15
OR
mendixmendixRange9.7.09.12.10
OR
mendixmendixRange9.18.09.18.4
OR
mendixmendixRange9.19.09.22.0

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 7",
    "versions": [
      {
        "version": "All versions < V7.23.34",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 8",
    "versions": [
      {
        "version": "All versions < V8.18.23",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 9",
    "versions": [
      {
        "version": "All versions < V9.22.0",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 9 (V9.12)",
    "versions": [
      {
        "version": "All versions < V9.12.10",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 9 (V9.18)",
    "versions": [
      {
        "version": "All versions < V9.18.4",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Mendix Applications using Mendix 9 (V9.6)",
    "versions": [
      {
        "version": "All versions < V9.6.15",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.4%

Related for CVE-2023-23835