Vulnerability Description
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Northgrid | Proself | <= 1.07 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN19661362/Third Party Advisory
- https://www.proself.jp/information/149/Vendor Advisory
- https://www.proself.jp/information/150/Vendor Advisory
- https://jvn.jp/en/jp/JVN19661362/Third Party Advisory
- https://www.proself.jp/information/149/Vendor Advisory
- https://www.proself.jp/information/150/Vendor Advisory
FAQ
What is CVE-2023-39416?
CVE-2023-39416 is a vulnerability with a CVSS score of 7.2 (HIGH). Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with a...
How severe is CVE-2023-39416?
CVE-2023-39416 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39416?
Check the references section above for vendor advisories and patch information. Affected products include: Northgrid Proself.