{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T12:29:10.905","vulnerabilities":[{"cve":{"id":"CVE-2023-45688","sourceIdentifier":"cve@rapid7.com","published":"2023-10-16T17:15:10.183","lastModified":"2024-11-21T08:27:13.613","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp \"SIZE\" command"},{"lang":"es","value":"La falta de suficiente validación de ruta en los servidores Titan MFT y Titan SFTP de South River Technologies en Linux permite a un atacante autenticado obtener el tamaño de un archivo arbitrario en el sistema de archivos utilizando path traversal en el comando ftp \"SIZE\""}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*","versionEndExcluding":"2.0.18","matchCriteriaId":"6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*","versionEndExcluding":"2.0.18","matchCriteriaId":"B3EDB373-C26D-478D-9B44-D2D5A19276E5"}]}]}],"references":[{"url":"https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690","source":"cve@rapid7.com","tags":["Vendor Advisory"]},{"url":"https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/","source":"cve@rapid7.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}