Описание
Microsoft Dynamics GP Spoofing Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An authenticated user would have to visit a specific URL that will create an action for a workflow.
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires that an attacker has privileges to generate a workflow. Dynamics GP will send an email to the user based on the info registered.
According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?
Information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
Уязвимость пакета программного обеспечения для бухгалтерского учета или планирования ресурсов предприятия среднего размера Microsoft Dynamics GP, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки
EPSS
5.4 Medium
CVSS3