Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-2541
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Sensitive information disclosure in KNIME Hub Web Application
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
将系统数据暴露到未授权控制的范围
Source: NVD (National Vulnerability Database)
Vulnerability Title
KNIME Business Hub 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
KNIME Business Hub是KNIME公司的用于数据科学自动化、部署模型、团队协作和管理工作流的企业软件。 KNIME Business Hub 1.4.0之前版本存在安全漏洞。攻击者利用该漏洞可以访问有关应用程序的内部信息,例如版本、主机名或IP地址。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
KNIMEKNIME Business Hub 1.0.0 ~ 1.4.0 -
II. Public POCs for CVE-2023-2541
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-2541
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-2541

No comments yet


Leave a comment