First published: Wed Mar 08 2023(Updated: )
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.
Credit: security@proofpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Proofpoint Enterprise Protection | <8.13.22 | |
Proofpoint Enterprise Protection | >=8.18.0<8.18.4 | |
Proofpoint Enterprise Protection | =8.18.6 | |
Proofpoint Enterprise Protection | =8.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0090 is a vulnerability in Proofpoint Enterprise Protection (PPS/POD) that allows for remote code execution through 'eval injection'.
CVE-2023-0090 has a severity rating of 9.8, which is classified as critical.
Proofpoint Enterprise Protection versions 8.13.22, 8.18.0 - 8.18.4, 8.18.6, and 8.20.0 are affected by CVE-2023-0090.
An attacker can exploit CVE-2023-0090 by executing remote code through 'eval injection' in the webservices API of Proofpoint Enterprise Protection.
To fix CVE-2023-0090, it is recommended to update Proofpoint Enterprise Protection to a version that is not affected by the vulnerability.