Vulnerability Details : CVE-2023-1724
Potential exploit
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
Vulnerability category: Cross site scripting (XSS)Gain privilege
Products affected by CVE-2023-1724
- cpe:2.3:a:ladybirdweb:faveo_helpdesk:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1724
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1724
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
2.1
|
5.2
|
Fluid Attacks | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2023-1724
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- help@fluidattacks.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-1724
-
https://fluidattacks.com/advisories/towers/
Faveo Helpdesk Enterprise 6.0.1 - Account Takeover via XSS | Advisories | Fluid AttacksExploit;Third Party Advisory
-
https://github.com/ladybirdweb/faveo-helpdesk/
GitHub - ladybirdweb/faveo-helpdesk: Faveo Open source ticketing system build on Laravel frameworkProduct
Jump to