An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
References
Link | Resource |
---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10410 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Nov 2023, 19:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-17 10:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-5445
Mitre link : CVE-2023-5445
CVE.ORG link : CVE-2023-5445
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')