CVE-2023-45727
high-risk
Published 2023-10-18
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker.
Do I need to act?
!
21.0% chance of exploitation in next 30 days
EPSS score — higher than 79% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (5)
Third Party Advisory
https://jvn.jp/en/jp/JVN95981460/
Vendor Advisory
https://www.proself.jp/information/153/
Third Party Advisory
https://jvn.jp/en/jp/JVN95981460/
Vendor Advisory
https://www.proself.jp/information/153/
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-...
57
/ 100
high-risk
Severity
26/34 · High
Exploitability
21/34 · High
Exposure
10/34 · Low