#VU83892 Improper Authentication in Court Case Management Plus


Published: 2023-12-06

Vulnerability identifier: #VU83892

Vulnerability risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6354

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Court Case Management Plus
Client/Desktop applications / Other client software

Vendor: Tyler Technologies

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests within the Magistrate Court Case Management Plus. A remote attacker can manipulate the PDFViewer.aspx "filename" parameter and upload, delete and view arbitrary files.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Court Case Management Plus: All versions


External links
http://www.tylertech.com/solutions/courts-public-safety/courts-justice
http://github.com/qwell/disorder-in-the-court/blob/main/README-TylerTechnologies.md
http://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
http://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability