First published: Mon Dec 04 2023(Updated: )
Dell DM5500 5.14.0.0 and prior contain a Reflected Cross-Site Scripting Vulnerability. A network attacker with low privileges could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dell PowerProtect Data Manager Dm5500 Firmware | <=5.14.0.0 | |
Dell PowerProtect Data Manager Dm5500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44301 is a Reflected Cross-Site Scripting Vulnerability in Dell DM5500 firmware version 5.14.0.0 and prior.
CVE-2023-44301 allows a network attacker with low privileges to execute malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable Dell Powerprotect Data Manager DM5500.
The severity of CVE-2023-44301 is medium with a CVSS score of 5.4.
To fix CVE-2023-44301, it is recommended to apply the security update provided by Dell. More information can be found in the reference link.
The Common Weakness Enumeration (CWE) associated with CVE-2023-44301 is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').