Overview
- Description
- A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected.
- Source
- security@proofpoint.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.7
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:proofpoint:threat_response_auto_pull:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3821A290-3BCD-4C03-90CB-D001AC1590F7", "versionEndExcluding": "5.10.0" } ], "operator": "OR" } ] } ]