CVE-2023-7279

Sept. 2, 2024, 6:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Secure Systems Engineering Connaisseur

  • up to 3.3.0

Source

cna@vuldb.com

Tags

CVE-2023-7279 details

Published : Sept. 2, 2024, 6:15 p.m.
Last Modified : Sept. 2, 2024, 6:15 p.m.

Description

A vulnerability has been found in Secure Systems Engineering Connaisseur up to 3.3.0 and classified as problematic. This vulnerability affects unknown code of the file connaisseur/res/targets_schema.json of the component Delegation Name Handler. The manipulation leads to inefficient regular expression complexity. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 524b73ff7306707f6d3a4d1e86401479bca91b02. It is recommended to upgrade the affected component.

CVSS Score

1 2.6 3 4 5 6 7 8 9 10

Weakness

Weakness Name Description
CWE-1333 Inefficient Regular Expression Complexity The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

CVSS Data

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

Base Score

2.6

Exploitability Score

1.2

Impact Score

1.4

Base Severity

LOW

This website uses the NVD API, but is not approved or certified by it.