{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-46723","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-10-25T14:30:33.750Z","datePublished":"2023-10-31T15:34:44.646Z","dateUpdated":"2024-09-05T20:14:13.094Z"},"containers":{"cna":{"title":"lte-pic32-writer's sendto.txt may disclose URL and the API key","problemTypes":[{"descriptions":[{"cweId":"CWE-538","lang":"en","description":"CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.9,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh"}],"affected":[{"vendor":"paijp","product":"lte-pic32-writer","versions":[{"version":"<= 0.0.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-10-31T15:34:44.646Z"},"descriptions":[{"lang":"en","value":"lte-pic32-writer is a writer for PIC32 devices. In versions 0.0.1 and prior, those who use `sendto.txt` are vulnerable to attackers who known the IMEI reading the sendto.txt. The sendto.txt file can contain the SNS(such as slack and zulip) URL and API key. As of time of publication, a patch is not yet available. As workarounds, avoid using `sendto.txt` or use `.htaccess` to block access to `sendto.txt`."}],"source":{"advisory":"GHSA-9qgg-ph2v-v4mh","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:53:21.321Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-05T20:13:54.160029Z","id":"CVE-2023-46723","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-05T20:14:13.094Z"}}]}}