CVE-2023-43323

CVSS 3.1 Score 6.5 of 10 (medium)

Details

Published Sep 28, 2023
Updated: Sep 29, 2023

Summary

The vulnerability CVE-2023-43323 affects mooSocial 3.1.8, allowing external service interaction on the post function. This vulnerability is triggered when the server sends a HTTP and DNS request to an external server. The affected parameters include messageText, data[wall_photo], data[userShareVideo], and data[userShareLink]. The risk score for this vulnerability is 25, with a base severity of MEDIUM. The exploitability score is 3.9, indicating a moderate level of difficulty for exploitation. The potential impact on an organization includes low integrity and confidentiality impacts, with no availability impact. There are no privileges required or user interaction necessary for exploitation. It is recommended to remediate this vulnerability by updating mooSocial to a patched version to mitigate the risk of external service interaction and potential unauthorized access to sensitive information.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-43323 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions