CVE-2023-29260

CVSS 3.1 Score 5.4 of 10 (medium)

Details

Published Jul 19, 2023
Updated: Jul 28, 2023
CWE ID 918

Summary

CVE-2023-29260: IBM Sterling Connect:Express for UNIX version 1.5 contains a server-side request forgery (SSRF) vulnerability. An authenticated attacker can exploit this issue to send unauthorized requests from the affected system. Potentially, this could lead to network enumeration or facilitation of further attacks. (IBM X-Force ID: 252135) This vulnerability, identified as CVE-2023-29260, affects IBM Sterling Connect:Express for UNIX version 1.5. An authenticated user can manipulate the system to send unauthorized requests, leading to network enumeration and potentially enabling other attacks. This issue should be addressed promptly to minimize potential risks. (IBM X-Force ID: 252135) IBM Sterling Connect:Express for UNIX 1.5 (CVE-2023-29260) is susceptible to server-side request forgery (SSRF), compromising the system's integrity. Authenticated attackers can send malicious requests, which may result in network enumeration and other attacks. IBM X-Force ID: 252135 provides more details on this security concern. Security vulnerability CVE-2023-29260 impacts IBM Sterling Connect:Express for UNIX 1.5. Affected systems may be exposed to server-side request forgery (SSRF) attacks, enabling authenticated attackers to send unauthorized requests. Potential consequences include network enumeration and further attacks. (IBM X-Force ID: 252135) IBM Sterling Connect:Express for UNIX 1.5 (CVE-2023-29260) is vulnerable to server-side request forgery (SSRF), allowing authenticated attackers to send unauthorized requests from the system. The consequences of this vulnerability can range from network enumeration to facilitating additional attacks. (IBM X-Force ID: 252135)

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-29260 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions