Vulnerability Description
On a Wolters Kluwer B.POINT 23.70.00 server running Linux on premises, during the authentication phase, a validated system user can achieve remote code execution via Argument Injection in the server-to-server module.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolterskluwer | B.Point | 23.70.00 |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
- https://www.gruppotim.it/it/footer/red-team.htmlThird Party Advisory
FAQ
What is CVE-2023-49328?
CVE-2023-49328 is a vulnerability with a CVSS score of 7.2 (HIGH). On a Wolters Kluwer B.POINT 23.70.00 server running Linux on premises, during the authentication phase, a validated system user can achieve remote code execution via Argument Injection in the server-t...
How severe is CVE-2023-49328?
CVE-2023-49328 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49328?
Check the references section above for vendor advisories and patch information. Affected products include: Wolterskluwer B.Point, Linux Linux Kernel.