{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-33181","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-05-17T22:25:50.696Z","datePublished":"2023-05-30T20:57:38.437Z","dateUpdated":"2025-01-09T18:48:26.867Z"},"containers":{"cna":{"title":"Sensitive Information Disclosure abusing Stack Trace in Xibo CMS","problemTypes":[{"descriptions":[{"cweId":"CWE-209","lang":"en","description":"CWE-209: Generation of Error Message Containing Sensitive Information","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m"},{"name":"https://claroty.com/team82/disclosure-dashboard","tags":["x_refsource_MISC"],"url":"https://claroty.com/team82/disclosure-dashboard"},{"name":"https://xibosignage.com/blog/security-advisory-2023-05/","tags":["x_refsource_MISC"],"url":"https://xibosignage.com/blog/security-advisory-2023-05/"}],"affected":[{"vendor":"xibosignage","product":"xibo-cms","versions":[{"version":">= 3.0.0, < 3.3.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-05-30T20:57:38.437Z"},"descriptions":[{"lang":"en","value":"Xibo is a content management system (CMS). Starting in version 3.0.0 and prior to version 3.3.5, some API routes will print a stack trace when called with missing or invalid parameters revealing sensitive information about the locations of paths that the server is using. Users should upgrade to version 3.3.5, which fixes this issue. There are no known workarounds aside from upgrading."}],"source":{"advisory":"GHSA-c9cx-ghwr-x58m","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:39:35.745Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-c9cx-ghwr-x58m"},{"name":"https://claroty.com/team82/disclosure-dashboard","tags":["x_refsource_MISC","x_transferred"],"url":"https://claroty.com/team82/disclosure-dashboard"},{"name":"https://xibosignage.com/blog/security-advisory-2023-05/","tags":["x_refsource_MISC","x_transferred"],"url":"https://xibosignage.com/blog/security-advisory-2023-05/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-09T18:48:16.050881Z","id":"CVE-2023-33181","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-09T18:48:26.867Z"}}]}}