First published: Fri Nov 17 2023(Updated: )
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee ePolicy Orchestrator | <5.10.0 | |
McAfee ePolicy Orchestrator | =5.10.0-service_pack_1_update | |
McAfee ePolicy Orchestrator | =5.10.0-service_pack_1_update_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_10 | |
McAfee ePolicy Orchestrator | =5.10.0-update_11 | |
McAfee ePolicy Orchestrator | =5.10.0-update_11_hotfix_1 | |
McAfee ePolicy Orchestrator | =5.10.0-update_11_hotfix_2 | |
McAfee ePolicy Orchestrator | =5.10.0-update_12 | |
McAfee ePolicy Orchestrator | =5.10.0-update_13 | |
McAfee ePolicy Orchestrator | =5.10.0-update_14 | |
McAfee ePolicy Orchestrator | =5.10.0-update_15 | |
McAfee ePolicy Orchestrator | =5.10.0-update_2 | |
McAfee ePolicy Orchestrator | =5.10.0-update_3 | |
McAfee ePolicy Orchestrator | =5.10.0-update_4 | |
McAfee ePolicy Orchestrator | =5.10.0-update_5 | |
McAfee ePolicy Orchestrator | =5.10.0-update_6 | |
McAfee ePolicy Orchestrator | =5.10.0-update_7 | |
McAfee ePolicy Orchestrator | =5.10.0-update_8 | |
McAfee ePolicy Orchestrator | =5.10.0-update_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5445 is medium with a CVSS score of 5.4.
CVE-2023-5445 allows a remote low privileged user to modify the URL parameter and redirect URL requests to a malicious site in ePolicy Orchestrator.
CVE-2023-5445 affects McAfee ePolicy Orchestrator versions up to 5.10.0 CP1 Update 2.
To fix CVE-2023-5445, users should update to ePolicy Orchestrator version 5.10.0 CP1 Update 2 or later.
You can find more information about CVE-2023-5445 at the following link: [https://kcm.trellix.com/corporate/index?page=content&id=SB10410](https://kcm.trellix.com/corporate/index?page=content&id=SB10410).