All the vulnerabilites related to Trellix - Trellix ePolicy Orchestrator (ePO)
cve-2022-3338
Vulnerability from cvelistv5
Published
2022-10-18 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trellix | Trellix ePolicy Orchestrator (ePO) |
Version: unspecified < 5.10 Update 14 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10387" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trellix ePolicy Orchestrator (ePO)", "vendor": "Trellix", "versions": [ { "lessThan": "5.10 Update 14", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611: Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-18T00:00:00", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10387" } ], "source": { "discovery": "EXTERNAL" }, "title": "XXE in Trellix ePO server", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2022-3338", "datePublished": "2022-10-18T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T01:07:06.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3339
Vulnerability from cvelistv5
Published
2022-10-18 00:00
Modified
2024-08-03 01:07
Severity ?
EPSS score ?
Summary
A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Trellix | Trellix ePolicy Orchestrator (ePO) |
Version: unspecified < 5.10 Update 14 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10387" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trellix ePolicy Orchestrator (ePO)", "vendor": "Trellix", "versions": [ { "lessThan": "5.10 Update 14", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator\u0027s session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-18T00:00:00", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10387" } ], "source": { "discovery": "EXTERNAL" }, "title": "Reflected XSS in Trellix ePO server", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2022-3339", "datePublished": "2022-10-18T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T01:07:06.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }