Vulnerability Description
An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eptura | Archibus | 4.0.3 |
Related Weaknesses (CWE)
References
- https://cds.thalesgroup.com/en/tcs-cert/CVE-2023-48645
- https://excellium-services.com/cert-xlm-advisory/CVE-2023-48645Third Party Advisory
- https://excellium-services.com/cert-xlm-advisory/CVE-2023-48645Third Party Advisory
FAQ
What is CVE-2023-48645?
CVE-2023-48645 is a vulnerability with a CVSS score of 7.8 (HIGH). An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh bu...
How severe is CVE-2023-48645?
CVE-2023-48645 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48645?
Check the references section above for vendor advisories and patch information. Affected products include: Eptura Archibus.