An attacker could create malicious requests to obtain sensitive information about the web server.
Solution:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03 | government resource third party advisory us government resource |