Show plain JSON{"id": "CVE-2023-49706", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 1.6}]}, "published": "2023-12-19T19:15:07.800", "references": [{"url": "https://linotp.org/CVE-2023-49706.txt", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://linotp.org/security-update-linotp3-selfservice.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.linotp.org/news.html", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-362"}]}], "descriptions": [{"lang": "en", "value": "Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal."}, {"lang": "es", "value": "El manejo defectuoso del contexto de solicitud en Self Service en LinOTP 3.x anterior a 3.2.5 permite a atacantes remotos no autenticados escalar privilegios, permiti\u00e9ndoles as\u00ed actuar como y con los permisos de otro usuario. Los atacantes deben generar solicitudes API repetidas para desencadenar una condici\u00f3n de ejecuci\u00f3n con actividad de usuario simult\u00e1nea en el portal de autoservicio."}], "lastModified": "2023-12-28T19:56:43.647", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:linotp:linotp:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFFA1A9F-16EA-4923-A86A-709DA8A48692", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.0.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:linotp:virtual_appliance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DED984BA-D885-4B29-A1F9-92AFE193DAD1", "versionEndIncluding": "3.2.4", "versionStartIncluding": "3.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}