Vulnerability Description
This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Capensis | Canopsis | 23.04 |
Related Weaknesses (CWE)
References
- https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/so
- https://git.canopsis.net/canopsis/canopsis-community/-/blob/develop/community/so
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canoThird Party Advisory
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canoThird Party Advisory
FAQ
What is CVE-2023-3196?
CVE-2023-3196 is a vulnerability with a CVSS score of 4.7 (MEDIUM). This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.
How severe is CVE-2023-3196?
CVE-2023-3196 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3196?
Check the references section above for vendor advisories and patch information. Affected products include: Capensis Canopsis.