{"api_version":"1","generated_at":"2026-04-24T09:27:12+00:00","cve":"CVE-2023-1783","urls":{"html":"https://cve.report/CVE-2023-1783","api":"https://cve.report/api/cve/CVE-2023-1783.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1783","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1783"},"summary":{"title":"CVE-2023-1783","description":"OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.","state":"PUBLIC","assigner":"help@fluidattacks.com","published_at":"2023-06-23 22:15:00","updated_at":"2023-07-06 17:53:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://fluidattacks.com/advisories/stirling/","name":"https://fluidattacks.com/advisories/stirling/","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Orangescrum/orangescrum/","name":"https://github.com/Orangescrum/orangescrum/","refsource":"MISC","tags":[],"title":"GitHub - Orangescrum/orangescrum: Orangescrum is a simple yet powerful free and open source project management software that helps team to organize their tasks, projects and deliver more.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1783","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1783","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1783","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"orangescrum","cpe5":"orangescrum","cpe6":"2.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1783","ASSIGNER":"help@fluidattacks.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.\n\n\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Orangescrum","product":{"product_data":[{"product_name":"Orangescrum","version":{"version_data":[{"version_affected":"=","version_value":"2.0.11"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/Orangescrum/orangescrum/","refsource":"MISC","name":"https://github.com/Orangescrum/orangescrum/"},{"url":"https://fluidattacks.com/advisories/stirling/","refsource":"MISC","name":"https://fluidattacks.com/advisories/stirling/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-23 22:15:00","lastModifiedDate":"2023-07-06 17:53:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":7.6,"baseSeverity":"HIGH"},"exploitabilityScore":2.3,"impactScore":4.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:orangescrum:orangescrum:2.0.11:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}