CVE-2023-5445 Vulnerability Details

  /     /     /  

CVE-2023-5445 Metadata Quick Info

CVE Published: 17/11/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: trellix | Vendor: Trellix | Product: ePolicy Orchestrator
Status : PUBLISHED

CVE-2023-5445 Description

An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.

Metrics

CVSS Version: 3.1 | Base Score: 5.4 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* LOW
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-601
CWE Name: CWE-601 URL Redirection to Untrusted Site ( Open Redirect )
Source: Trellix

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-194
CAPEC Description: CAPEC-194 Fake the Source of Data


Source: NVD (National Vulnerability Database).