First published: Wed Nov 29 2023(Updated: )
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix Enterprise Security Manager | <11.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-6070.
The severity of CVE-2023-6070 is medium with a CVSS score of 4.3.
CVE-2023-6070 affects Trellix Enterprise Security Manager versions up to exclusive version 11.6.8.
A low privileged authenticated user can exploit CVE-2023-6070 to upload arbitrary content and potentially alter the configuration of the server.
Yes, the fix for CVE-2023-6070 is to update to ESM version 11.6.8 or higher.