Lucene search

K
cvelistTrellixCVELIST:CVE-2023-5607
HistoryNov 27, 2023 - 10:36 a.m.

CVE-2023-5607

2023-11-2710:36:51
CWE-22
trellix
www.cve.org
path traversal
tacc epo extension
arbitrary code execution
gti reputation file
user interface

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

16.4%

An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Trellix Application and Change Control (TACC)",
    "vendor": "Trellix",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to version 8.4.0"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

0.0005 Low

EPSS

Percentile

16.4%

Related for CVELIST:CVE-2023-5607