Vulnerability Details : CVE-2023-31868
Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-31868
- cpe:2.3:a:sage:x3:12.14.0.50-0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31868
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31868
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2023-31868
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31868
-
https://github.com/Digitemis/Advisory/blob/main/CVE-2023-31868.txt
Advisory/CVE-2023-31868.txt at main · Digitemis/Advisory · GitHubThird Party Advisory
-
http://sage.com
Sage UK - Software & Solutions for Every BusinessProduct
Jump to