First published: Wed Feb 01 2023(Updated: )
Dell EMC Data Protection Central, versions 19.1 through 19.7, contains a Host Header Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary \u2018Host\u2019 header values to poison a web cache or trigger redirections.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Data Protection Central | >=19.1<19.8 | |
Dell Dp4400 Firmware | >=2.5<=2.7 | |
Dell Dp4400 | ||
Dell Dp5900 Firmware | >=2.5<=2.7 | |
Dell Dp5900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Dell EMC Data Protection Central vulnerability is CVE-2022-45102.
The Dell EMC Data Protection Central vulnerability, CVE-2022-45102, is a Host Header Injection vulnerability that allows a remote unauthenticated attacker to inject arbitrary 'Host' header values to poison a web cache or trigger redirections.
Versions 19.1 through 19.7 of Dell EMC Data Protection Central are affected by this vulnerability.
An attacker can exploit this vulnerability by injecting arbitrary 'Host' header values to poison a web cache or trigger redirections.
Yes, a security update is available for this vulnerability. Please refer to the Dell EMC support website for more information.