CVE-2023-4296

?If an attacker tricks an admin user of PTC Codebeamer into clicking on a malicious link, it may allow the attacker to inject arbitrary code to be executed in the browser on the target device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:intland:codebeamer:21.09.0:-:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp3:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp6:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp7:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp8:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp9:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp10:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp11:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp12:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp13:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:-:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp3:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp3:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp6:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp7:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp8:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:-:*:*:*:*:*:*

History

13 Feb 2025, 17:17

Type Values Removed Values Added
CWE CWE-79
Summary ?If an attacker tricks an admin user of PTC Codebeamer into clicking on a malicious link, it may allow the attacker to inject arbitrary code to be executed in the browser on the target device. ?If an attacker tricks an admin user of PTC Codebeamer into clicking on a malicious link, it may allow the attacker to inject arbitrary code to be executed in the browser on the target device.
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-241-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-23-241-01 - Third Party Advisory, US Government Resource
References (MISC) http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html - () http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html -
References (MISC) https://codebeamer.com/cb/wiki/31346480 - Vendor Advisory () https://codebeamer.com/cb/wiki/31346480 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/10 - () http://seclists.org/fulldisclosure/2023/Sep/10 -

07 Nov 2023, 04:22

Type Values Removed Values Added
CPE cpe:2.3:a:intland:codebeamer:21.09.0:sp12:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp3:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp3:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp9:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp6:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp13:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp8:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:-:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:-:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp8:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:-:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp11:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp7:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp7:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp6:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp10:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp1:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp4:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.04.0:sp5:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:21.09.0:sp2:*:*:*:*:*:*
cpe:2.3:a:intland:codebeamer:22.10.0:sp3:*:*:*:*:*:*
References
  • (MISC) http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/10 -
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-241-01 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-241-01 - Third Party Advisory, US Government Resource
References (MISC) https://codebeamer.com/cb/wiki/31346480 - (MISC) https://codebeamer.com/cb/wiki/31346480 - Vendor Advisory
First Time Intland codebeamer
Intland
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

29 Aug 2023, 23:49

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-29 22:15

Updated : 2025-02-13 17:17


NVD link : CVE-2023-4296

Mitre link : CVE-2023-4296


JSON object : View

Products Affected

intland

  • codebeamer
CWE

No CWE.