Логотип exploitDog
bind:CVE-2023-50930
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-50930

Количество 3

Количество 3

nvd логотип

CVE-2023-50930

около 2 лет назад

An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-pp4c-5p5c-qf45

около 2 лет назад

An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.

CVSS3: 8.3
EPSS: Низкий
fstec логотип

BDU:2024-01333

около 2 лет назад

Уязвимость программного обеспечения шифрования электронной почты для Jira S/Notify, связанная с подделкой межсайтовых запросов, позволяющая нарушителю осуществить CSRF-атаку

CVSS3: 8.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-50930

An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.

CVSS3: 8.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-pp4c-5p5c-qf45

An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.

CVSS3: 8.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01333

Уязвимость программного обеспечения шифрования электронной почты для Jira S/Notify, связанная с подделкой межсайтовых запросов, позволяющая нарушителю осуществить CSRF-атаку

CVSS3: 8.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу