Vulnerability Description
Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Free5Gc | Free5Gc | 1.1.1 |
Related Weaknesses (CWE)
References
- https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-frThird Party Advisory
- https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-frThird Party Advisory
FAQ
What is CVE-2023-4659?
CVE-2023-4659 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It...
How severe is CVE-2023-4659?
CVE-2023-4659 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-4659?
Check the references section above for vendor advisories and patch information. Affected products include: Free5Gc Free5Gc.