Vulnerability Description
In Janitza GridVis through 9.0.66, exposed dangerous methods in the de.janitza.pasw.project.server.ServerDatabaseProject project load functionality allow remote authenticated administrative users to execute arbitrary Groovy code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Janitza | Gridvis | < 9.0.67 |
References
- https://code-white.comNot Applicable
- https://code-white.com/public-vulnerability-list/Third Party Advisory
- https://code-white.comNot Applicable
- https://code-white.com/public-vulnerability-list/Third Party Advisory
FAQ
What is CVE-2023-50895?
CVE-2023-50895 is a vulnerability with a CVSS score of 7.2 (HIGH). In Janitza GridVis through 9.0.66, exposed dangerous methods in the de.janitza.pasw.project.server.ServerDatabaseProject project load functionality allow remote authenticated administrative users to e...
How severe is CVE-2023-50895?
CVE-2023-50895 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-50895?
Check the references section above for vendor advisories and patch information. Affected products include: Janitza Gridvis.