Sametime Vulnerable to CSRF Attacks
CVE-2023-50349
8.8HIGH
Summary
HCL Sametime Proxy is subject to a Cross Site Request Forgery (CSRF) vulnerability that affects certain REST APIs. This flaw allows attackers to perform unauthorized actions through the application, potentially compromising user data or application integrity. Implementing security measures to mitigate the risk associated with CSRF attacks is essential for safeguarding the interests of users and maintaining the stability of the application. Organizations using HCL Sametime Proxy should be proactive in applying patches and conducting security assessments to protect against this type of vulnerability.
Affected Version(s)
HCL Sametime 11.5, 11.6, 11.6 IF1, 12.0, 12.0 FP1, 12.0.1, 12.0.1 FP1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved