Vulnerability Details : CVE-2023-6189
Missing access permissions checks
in the M-Files server before 23.11.13156.0 allow attackers to perform data write and export
jobs using the M-Files API methods.
Products affected by CVE-2023-6189
- cpe:2.3:a:m-files:m-files_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6189
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6189
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
M-Files Corporation |
CWE ids for CVE-2023-6189
-
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.Assigned by: security@m-files.com (Secondary)
References for CVE-2023-6189
-
https://product.m-files.com/security-advisories/cve-2023-6189/
CVE-2023-6189 – M-Files Product Center
-
https://https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6189/
Broken Link
Jump to