Vulnerability Details : CVE-2023-1647
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-1647
- cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1647
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1647
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
huntr.dev | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
huntr.dev |
CWE ids for CVE-2023-1647
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: security@huntr.dev (Primary)
References for CVE-2023-1647
-
https://github.com/sbs20/scanservjs/pull/606/commits/d51fd52c1569813990b8f74e64ae6979c665dca1
SECURITY: CommandBuilder fixes by sbs20 · Pull Request #606 · sbs20/scanservjs · GitHubPatch
-
https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6
Account Takeover and Persistence due to the Oauth Misconfiguration vulnerability found in cal.comExploit;Third Party Advisory
-
https://github.com/calcom/cal.com/commit/c76e5f46101a826b2de39123c22f50c840dddba0
Merge branch 'main' into fix/totp-google · calcom/cal.com@c76e5f4 · GitHubPatch
Jump to