Lucene search

K
cvelistProofpointCVELIST:CVE-2023-2819
HistoryJun 14, 2023 - 9:14 p.m.

CVE-2023-2819

2023-06-1421:14:38
CWE-79
Proofpoint
www.cve.org
2
vulnerability
stored cross-site scripting
proofpoint threat response
threat response auto pull
admin context
mime type
image file
arbitrary javascript code execution
network
adjacent network
authenticated administrator
cve-2023-2819

CVSS3

4.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5

Confidence

High

EPSS

0

Percentile

5.1%

A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. β€―This could result in arbitrary javascript code execution in an admin context.β€―All versions prior to 5.10.0 are affected.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Threat Response Auto Pull",
    "vendor": "Proofpoint",
    "versions": [
      {
        "lessThan": "5.10.0",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVELIST:CVE-2023-2819