Overview
- Description
- A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
- Source
- trellixpsirt@trellix.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- trellixpsirt@trellix.com
- CWE-918
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "491EC555-A038-43F6-A6AB-E455B6402EC1", "versionEndExcluding": "11.6.8" } ], "operator": "OR" } ] } ]