{"id":86065,"date":"2025-12-17T22:28:55","date_gmt":"2025-12-17T22:28:55","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2023-45893-unauthenticated-access-to-sensitive-customer-information-via-idor-in-floorsight-customer-portal","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2023-45893-unauthenticated-access-to-sensitive-customer-information-via-idor-in-floorsight-customer-portal\/","title":{"rendered":"<strong>CVE-2023-45893: Unauthenticated Access to Sensitive Customer Information via IDOR in Floorsight Customer Portal<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This report focuses on a significant cybersecurity threat denoted as CVE-2023-45893 that affects Floorsight&#8217;s Customer Portal for Q3 2023. An indirect object reference (IDOR) vulnerability has been identified, which could allow unauthorized remote attackers to access sensitive customer information. This vulnerability poses a substantial risk to data privacy and security, potentially leading to system compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2023-45893<br \/>\nSeverity: High (CVSS 7.5)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Risk of System Compromise and Data Leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-4162366687\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Floorsight Customer Portal | Q3 2023<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>An attacker can exploit this vulnerability by crafting a malicious request to the Order and Invoice pages in the Floorsight Customer Portal, manipulating the references to access data they are not authorized to view. Since the system does not adequately verify users&#8217; permissions, it allows an unauthenticated remote attacker to access sensitive customer information.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1771259946\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how a malicious HTTP request might be constructed:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/order\/12345 HTTP\/1.1\nHost: vulnerable-portal.floorsight.com<\/code><\/pre>\n<p>This request attempts to access the order details of Order ID 12345 without proper authentication. If successful, the attacker could view sensitive information about the order, including customer details.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, Floorsight has released a vendor patch that should be applied immediately. As a temporary solution, users can employ a Web Application Firewall (WAF) or Intrusion Detection System (IDS). However, it&#8217;s essential to note that these are temporary measures, and applying the vendor patch is ultimately the best way to secure your system against this vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This report focuses on a significant cybersecurity threat denoted as CVE-2023-45893 that affects Floorsight&#8217;s Customer Portal for Q3 2023. An indirect object reference (IDOR) vulnerability has been identified, which could allow unauthorized remote attackers to access sensitive customer information. This vulnerability poses a substantial risk to data privacy and security, potentially leading to system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-86065","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=86065"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/86065\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=86065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=86065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=86065"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=86065"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=86065"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=86065"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=86065"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=86065"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=86065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}