{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-42032","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2023-09-06T21:13:00.541Z","datePublished":"2024-05-03T02:12:20.797Z","dateUpdated":"2024-08-02T19:16:49.553Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2024-05-03T02:12:20.797Z"},"title":"Visualware MyConnection Server doRTAAccessUPass Exposed Dangerous Method Information Disclosure Vulnerability","descriptions":[{"lang":"en","value":"Visualware MyConnection Server doRTAAccessUPass Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Visualware MyConnection Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the doRTAAccessUPass method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-21611."}],"affected":[{"vendor":"Visualware","product":"MyConnection Server","versions":[{"version":"11.3c","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-749","description":"CWE-749: Exposed Dangerous Method or Function","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1398/","name":"ZDI-23-1398","tags":["x_research-advisory"]},{"url":"https://myconnectionserver.visualware.com/support/security-advisories","name":"vendor-provided URL","tags":["vendor-advisory"]}],"dateAssigned":"2023-09-06T21:25:44.977Z","datePublic":"2023-09-08T16:32:28.733Z","source":{"lang":"en","value":"06fe5fd2bc53027c4a3b7e395af0b850e7b8a044"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH"}}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-42032","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-06T21:00:41.065240Z"}}}],"affected":[{"cpes":["cpe:2.3:a:visualware:myconnection_server:-:*:*:*:*:*:*:*"],"vendor":"visualware","product":"myconnection_server","versions":[{"status":"affected","version":"-"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:25:29.232Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:16:49.553Z"},"title":"CVE Program Container","references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1398/","name":"ZDI-23-1398","tags":["x_research-advisory","x_transferred"]},{"url":"https://myconnectionserver.visualware.com/support/security-advisories","name":"vendor-provided URL","tags":["vendor-advisory","x_transferred"]}]}]}}