Authorization bypass through user-controlled key in CMS360 - CVE-2023-6341
Published: December 1, 2023 / Updated: December 18, 2023
Vulnerability identifier: #VU83617
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-6341
CWE-ID: CWE-639
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
CMS360
CMS360
Software vendor:
Catalis
Catalis
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to the authorization bypass through user-controlled key. A remote attacker can modify document and other identifiers in URLs to view sensitive court documents.
Remediation
Install updates from vendor's website.
External links
- https://catalisgov.com/courts-land-records-support/
- https://github.com/qwell/disorder-in-the-court/blob/main/README-Catalis.md
- https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
- https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems