CVE-2023-2819

A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. ?This could result in arbitrary javascript code execution in an admin context.?All versions prior to 5.10.0 are affected.? 
Configurations

Configuration 1 (hide)

cpe:2.3:a:proofpoint:threat_response_auto_pull:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:59

Type Values Removed Values Added
References () https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002 - Vendor Advisory () https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002 - Vendor Advisory

28 Jun 2023, 19:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References (MISC) https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002 - (MISC) https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002 - Vendor Advisory
First Time Proofpoint
Proofpoint threat Response Auto Pull
CPE cpe:2.3:a:proofpoint:threat_response_auto_pull:*:*:*:*:*:*:*:*
CWE CWE-79

14 Jun 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-14 22:15

Updated : 2024-11-21 07:59


NVD link : CVE-2023-2819

Mitre link : CVE-2023-2819

CVE.ORG link : CVE-2023-2819


JSON object : View

Products Affected

proofpoint

  • threat_response_auto_pull
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')