RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T11:53:52.767Z
Reserved: 2023-02-22T20:42:56.092Z
Link: CVE-2023-26455

No data.

Status : Modified
Published: 2023-11-02T14:15:10.873
Modified: 2024-11-21T07:51:30.080
Link: CVE-2023-26455

No data.