CVE Vulnerabilities

CVE-2023-45794

Authentication Bypass by Capture-replay

Published: Nov 14, 2023 | Modified: Dec 28, 2023
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.4.0), Mendix Applications using Mendix 7 (All versions < V7.23.37), Mendix Applications using Mendix 8 (All versions < V8.18.27), Mendix Applications using Mendix 9 (All versions < V9.24.10). A capture-replay flaw in the platform could have an impact to apps built with the platform, if certain preconditions are met that depend on the apps model and access control design.

This could allow authenticated attackers to access or modify objects without proper authorization, or escalate privileges in the context of the vulnerable app.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

Name Vendor Start Version End Version
Mendix Siemens 7.0.0 (including) 7.23.37 (excluding)
Mendix Siemens 8.0.0 (including) 8.18.27 (excluding)
Mendix Siemens 9.0.0 (including) 9.24.10 (excluding)
Mendix Siemens 10.0.0 (including) 10.4.0 (excluding)

Potential Mitigations

References