{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5296","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-09-29T14:27:36.046Z","datePublished":"2023-09-29T21:31:04.441Z","dateUpdated":"2024-09-23T16:17:38.603Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-25T04:54:31.430Z"},"title":"Xinhu RockOA Password password recovery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-640","lang":"en","description":"CWE-640 Weak Password Recovery"}]}],"affected":[{"vendor":"Xinhu","product":"RockOA","versions":[{"version":"1.1","status":"affected"},{"version":"2.3.2","status":"affected"},{"version":"15.X3amdi","status":"affected"}],"modules":["Password Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in Xinhu RockOA 1.1/2.3.2/15.X3amdi gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei api.php?m=reimplat&a=index der Komponente Password Handler. Durch Manipulation mit unbekannten Daten kann eine weak password recovery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-09-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-09-29T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-09-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-22T14:39:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"magicwave18 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.240926","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.240926","tags":["signature","permissions-required"]},{"url":"https://github.com/magicwave18/vuldb/issues/1","tags":["exploit","issue-tracking"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:52:08.982Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.240926","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.240926","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/magicwave18/vuldb/issues/1","tags":["exploit","issue-tracking","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-23T16:17:03.498850Z","id":"CVE-2023-5296","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-23T16:17:38.603Z"}}]}}