Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-0090: Proofpoint Enterprise Protection multiple perl eval vulnerabilities | Proofpoint US

The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection’. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.

CVE
#vulnerability#web#rce#perl#auth

Proofpoint Enterprise Protection multiple perl eval vulnerabilities, CVE-2023-0089/CVE-2023-0090

Advisory ID: PFPT-SA-2023-0001

Proofpoint Enterprise Protection contains multiple perl eval vulnerabilities allowing for remote code execution.

These vulnerabilities affect all versions 8.20.0 and below.

Vulnerability Information****Proofpoint Enterprise Protection webutils authenticated RCE, CVE-2023-0089

CVE-2023-0089 describes a vulnerability which allows for remote code execution by an authenticated user. Patches are available.

This vulnerability has been assigned a CVSS score of 8.8 (HIGH):

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Proofpoint Enterprise Protection webservices unauthenticated RCE, CVE-2023-0090

CVE-2023-0090 describes a vulnerability which allows for remote code execution by an anonymous user. The vulnerability does require access to the webservices API to be exploitable but such access requires non-standard configuration. Patches are available.

This vulnerability has been assigned a CVSS score of 8.1 (HIGH):

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Fixed Software

Proofpoint has released the following patches:

8.20.0 patch 4570
8.19.0 patch 4581
8.18.6 patch 4580
8.13.22 patch 4566

The patches are now available through the customer support portal.

Proofpoint On-Demand Customers

No action is required. Applicable fixes have already been deployed by Proofpoint.

Proofpoint On-Premises Customers

If you are running a supported version that is configured to deploy releases automatically, no action is required. Applicable fixes have been automatically deployed.

For on-premise environments that are configured to manually apply releases, install the applicable release as noted above.

If you are running an end of life release please upgrade to a supported release as soon as possible.

For any questions or concerns please contact Proofpoint Support.

Acknowledgments

Thanks to ly1g3 for their co-ordinated disclosure of this issue.

URL

https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0001

Revision History

Version

Description

Section

Date

1.0

Initial Release

March 7, 2022

Legal Disclaimer

THIS DOCUMENT IS PROVIDED ON AN “AS IS” BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907