Vulnerability Description
Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery vulnerability in the job callback URL parameter that allows attackers to bypass network restrictions. Attackers can exploit the unvalidated parameter to initiate file, service, and network enumeration by forcing the application to make HTTP, DNS, or file requests to arbitrary destinations.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ateme | Titan File | 3.9.8.0 |
Related Weaknesses (CWE)
References
- https://www.ateme.com/product-titan-software/Product
- https://www.exploit-db.com/exploits/51582ExploitThird Party Advisory
- https://www.vulncheck.com/advisories/ateme-titan-file-authenticated-server-side-Third Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.phpThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.phpThird Party Advisory
FAQ
What is CVE-2023-53893?
CVE-2023-53893 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery vulnerability in the job callback URL parameter that allows attackers to bypass network restrictions. Attackers can expl...
How severe is CVE-2023-53893?
CVE-2023-53893 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53893?
Check the references section above for vendor advisories and patch information. Affected products include: Ateme Titan File.