Lucene search

K
nvd[email protected]NVD:CVE-2023-5607
HistoryNov 27, 2023 - 11:15 a.m.

CVE-2023-5607

2023-11-2711:15:08
CWE-22
web.nvd.nist.gov
4
tacc epo
path traversal
gti reputation file
arbitrary code execution
user interface

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

16.2%

An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.

Affected configurations

Nvd
Node
trellixapplication_and_change_controlRange<8.4.0
VendorProductVersionCPE
trellixapplication_and_change_control*cpe:2.3:a:trellix:application_and_change_control:*:*:*:*:*:*:*:*

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

16.2%

Related for NVD:CVE-2023-5607