Vulnerability Details : CVE-2023-0090
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.
Products affected by CVE-2023-0090
- cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:*:*:*:*
- cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:*:*:*:*
- cpe:2.3:a:proofpoint:enterprise_protection:8.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:proofpoint:enterprise_protection:8.18.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-0090
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0090
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Proofpoint Inc. |
CWE ids for CVE-2023-0090
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").Assigned by: security@proofpoint.com (Secondary)
References for CVE-2023-0090
-
https://www.proofpoint.com/security/security-advisories/pfpt-sa-2023-0001
Proofpoint Enterprise Protection perl eval vulnerabilities | Proofpoint USVendor Advisory
Jump to