Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
References
Link | Resource |
---|---|
https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md | Exploit Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Press/Media Coverage |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
https://www.henschen.com/government | Product |
https://github.com/qwell/disorder-in-the-court/blob/main/README-Henschen%26Associates.md | Exploit Third Party Advisory |
https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/ | Press/Media Coverage |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | Third Party Advisory US Government Resource |
https://www.henschen.com/government | Product |
Configurations
History
No history.
Information
Published : 2023-11-30 18:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6376
Mitre link : CVE-2023-6376
CVE.ORG link : CVE-2023-6376
JSON object : View
Products Affected
henschen
- court_document_management
CWE
CWE-330
Use of Insufficiently Random Values