{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-38335","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-10-24T20:28:58.255Z","dateReserved":"2023-07-14T00:00:00.000Z","datePublished":"2023-07-20T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-07-26T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Omnis Studio 10.22.00 has incorrect access control. It advertises a feature for making Omnis libraries \"always private\" - this is supposed to be an irreversible operation. However, due to implementation issues, \"always private\" Omnis libraries can be opened by the Omnis Studio browser by bypassing specific checks. This violates the expected behavior of an \"irreversible operation\"."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt"},{"name":"20230721 [SYSS-2023-005]: Omnis Studio - Expected Behavior Violation (CWE-440) (CVE-2023-38335)","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2023/Jul/41"},{"url":"http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html"},{"name":"20230724 APPLE-SA-2023-07-24-1 Safari 16.6","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2023/Jul/43"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:39:12.753Z"},"title":"CVE Program Container","references":[{"url":"https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt","tags":["x_transferred"]},{"name":"20230721 [SYSS-2023-005]: Omnis Studio - Expected Behavior Violation (CWE-440) (CVE-2023-38335)","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2023/Jul/41"},{"url":"http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html","tags":["x_transferred"]},{"name":"20230724 APPLE-SA-2023-07-24-1 Safari 16.6","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2023/Jul/43"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-276","lang":"en","description":"CWE-276 Incorrect Default Permissions"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-24T20:25:18.168515Z","id":"CVE-2023-38335","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-24T20:28:58.255Z"}}]}}