CVE-2023-6071

An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*

History

05 Dec 2023, 19:46

Type Values Removed Values Added
CPE cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE CWE-77
First Time Trellix enterprise Security Manager
Trellix
References () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - () https://kcm.trellix.com/corporate/index?page=content&id=SB10413 - Vendor Advisory

30 Nov 2023, 13:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-30 13:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-6071

Mitre link : CVE-2023-6071

CVE.ORG link : CVE-2023-6071


JSON object : View

Products Affected

trellix

  • enterprise_security_manager
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')