An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-08-02T07:59:44.718Z
Reserved: 2023-10-06T07:58:14.595Z
Link: CVE-2023-5445

No data.

Status : Modified
Published: 2023-11-17T10:15:08.167
Modified: 2024-11-21T08:41:47.000
Link: CVE-2023-5445

No data.