Archer Platform 6.x before 6.14 P1 HF2 (6.14.0.1.2) contains an insecure direct object reference vulnerability. An authenticated malicious user in a multi-instance installation could potentially exploit this vulnerability by manipulating application resource references in user requests to bypass authorization checks, in order to gain execute access to AWF application resources.
References
| Link | Resource |
|---|---|
| https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 | Vendor Advisory |
Configurations
History
15 Dec 2023, 14:28
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Archerirm archer
Archerirm |
|
| CWE | CWE-639 | |
| CPE | cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:* | |
| References | () https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/711859 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
12 Dec 2023, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-12-12 08:15
Updated : 2024-10-09 14:35
NVD link : CVE-2023-48641
Mitre link : CVE-2023-48641
JSON object : View
Products Affected
archerirm
- archer
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
