First published: Wed Jun 14 2023(Updated: )
A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected.
Credit: security@proofpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Proofpoint Threat Response Auto Pull | <5.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-2819.
The severity of CVE-2023-2819 is medium with a CVSS score of 4.3.
The affected software for CVE-2023-2819 is Proofpoint Threat Response Auto Pull version up to exclusive 5.10.0.
The CWE ID for CVE-2023-2819 is CWE-79.
To fix CVE-2023-2819, update your Proofpoint Threat Response Auto Pull software to a version higher than 5.10.0.