Abstract Advisory Information


There is an XSS vulnerability in module of Archibus iOS application.

This vulnerability allows an attacker to perform action on behalf of the user, exfiltrate data and so on.

Impact : Client-side code execution

Author: Elliot Rasch

Version affected


Name: Archibus iOS application

Vendor: Eptura

Versions: V4.0.3

Common Vulnerability Scoring System


5.4

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Patches


No patch available

References


  • https://cds.thalesgroup.com/en/tcs-belgium-luxembourg/CVE-2023-48644

Vulnerability Disclosure Timeline


  • 18/07/2023: Vulnerability discovery
  • 13/10/2023: Vulnerability Report to CERT-XLM
  • 17/10/2023: Vulnerability Report to Vendor through mails
  • 17/10/2023: Vulnerability Report to Vendor through form
  • 24/10/2023: Meeting with Eptura (Canceled by the vendor)
  • 24/10/2023: Vulnerability Report to Vendor through email
  • 07/11/2023: Called vendor, without any answer, and without possibility to leave a message.
  • 14/11/2023: Request CVE ID to Mitre
  • 17/11/2023: CVE number assigned
  • 21/11/2023: Vendor contacted again
  • 31/01/2024: Vulnerability disclosure