Description

An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.

Published: 2023-11-17
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-57760 An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
History

No history.

Subscriptions

Mcafee Epolicy Orchestrator
cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-08-02T07:59:44.718Z

Reserved: 2023-10-06T07:58:14.595Z

Link: CVE-2023-5445

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-17T10:15:08.167

Modified: 2024-11-21T08:41:47.000

Link: CVE-2023-5445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses