We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-4709

TOTVS RM Portal Login.aspx cross site scripting



Description

EN DE

A vulnerability classified as problematic has been found in TOTVS RM 12.1. Affected is an unknown function of the file Login.aspx of the component Portal. The manipulation of the argument VIEWSTATE leads to cross site scripting. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. It is possible to mitigate the problem by applying the configuration setting <pages validateRequest="true" [...] viewStateEncryptionMode="Always" />. It is recommended to change the configuration settings. The vendor was initially contacted early about this disclosure but did not respond in any way. In a later statement he explains, that "the behavior described [...] is related to specific configurations that are not part of the default application setup. In standard production environments, the relevant feature (VIEWSTATE) is disabled by default, which effectively mitigates the risk of exploitation."

Es wurde eine problematische Schwachstelle in TOTVS RM 12.1 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei Login.aspx der Komponente Portal. Durch Manipulation des Arguments VIEWSTATE mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Mit der Einstellung <pages validateRequest="true" [...] viewStateEncryptionMode="Always" /> kann das Problem adressiert werden. Als bestmögliche Massnahme werden Anpassungen an der Konfiguration empfohlen.

Reserved 2023-09-01 | Published 2023-09-01 | Updated 2025-05-27 | Assigner VulDB


LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
LOW: 3.1CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
2.6AV:N/AC:H/Au:N/C:N/I:P/A:N

Problem types

Cross Site Scripting

Code Injection

Product status

12.1
affected

Timeline

2023-09-01:Advisory disclosed
2023-09-01:CVE reserved
2023-09-01:VulDB entry created
2025-05-27:VulDB entry last update

Credits

chor4o (VulDB User) reporter

References

vuldb.com/?id.238572 (VDB-238572 | TOTVS RM Portal Login.aspx cross site scripting) vdb-entry technical-description mitigation

vuldb.com/?ctiid.238572 (VDB-238572 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.196885 (Submit #196885 | TOTVS - RM Portal - Login Versão 12.1.xxx ") third-party-advisory

tdn.totvs.com/pages/releaseview.action?pageId=284462425 related

cve.org (CVE-2023-4709)

nvd.nist.gov (CVE-2023-4709)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-4709

Support options

Helpdesk Chat, Email, Knowledgebase