Vulnerability Description
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mcafee | Epolicy Orchestrator | < 5.10.0 |
Related Weaknesses (CWE)
References
- https://kcm.trellix.com/corporate/index?page=content&id=SB10410Vendor Advisory
- https://kcm.trellix.com/corporate/index?page=content&id=SB10410Vendor Advisory
FAQ
What is CVE-2023-5445?
CVE-2023-5445 is a vulnerability with a CVSS score of 5.4 (MEDIUM). An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a...
How severe is CVE-2023-5445?
CVE-2023-5445 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5445?
Check the references section above for vendor advisories and patch information. Affected products include: Mcafee Epolicy Orchestrator.