CVE-2023-6071

An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
References () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - Vendor Advisory () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - Vendor Advisory
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 8.4

05 Dec 2023, 19:46

Type Values Removed Values Added
First Time Trellix
Trellix enterprise Security Manager
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*
References () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - Vendor Advisory

30 Nov 2023, 13:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-30 13:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6071

Mitre link : CVE-2023-6071

CVE.ORG link : CVE-2023-6071


JSON object : View

Products Affected

trellix

  • enterprise_security_manager
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')