Learn about CVE-2023-0090 affecting Proofpoint Enterprise Protection (PPS/POD) webservices. An anonymous user can execute remote code through 'eval injection'. Published on March 8, 2023.
This CVE-2023-0090 vulnerability was published on March 8, 2023, and affects Proofpoint Enterprise Protection (PPS/POD) webservices. It allows an anonymous user to execute remote code through 'eval injection'. The base severity score is 9.8, categorizing it as a critical vulnerability.
Understanding CVE-2023-0090
This vulnerability in Proofpoint Enterprise Protection (PPS/POD) enables an anonymous user to execute remote code through 'eval injection', requiring network access to the webservices API, although this kind of access is non-standard. The vulnerability impacts all versions 8.20.0 and below.
What is CVE-2023-0090?
The CVE-2023-0090 vulnerability in Proofpoint Enterprise Protection (PPS/POD) allows an anonymous user to execute remote code through 'eval injection' by exploiting a weakness in the webservices API. This type of access is typically not granted to users, making the exploitation scenario less likely but potentially damaging.
The Impact of CVE-2023-0090
The impact of CVE-2023-0090 is significant, with a base severity score of 9.8, indicating critical severity. The vulnerability can lead to high confidentiality, integrity, and availability impacts. Successful exploitation could result in unauthorized remote code execution by an anonymous user.
Technical Details of CVE-2023-0090
This vulnerability, with a CVSS v3.1 base score of 9.8, falls under CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'). The attack vector is through the network, with a low attack complexity and high availability, confidentiality, and integrity impacts.
Vulnerability Description
The vulnerability in Proofpoint Enterprise Protection (PPS/POD) allows an anonymous user to execute remote code through 'eval injection' in the webservices API, potentially leading to unauthorized access and malicious activities.
Affected Systems and Versions
All versions of Proofpoint Enterprise Protection (PPS/POD) up to and including 8.20.0 are affected by this vulnerability, making it crucial for users to take immediate action to secure their systems.
Exploitation Mechanism
Exploiting this vulnerability requires network access to the webservices API, which is not a standard configuration. However, threat actors could potentially gain access and execute remote code through the 'eval injection' method if the vulnerability is not addressed.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-0090, organizations and users should take immediate steps to secure their systems and implement long-term security practices to prevent future vulnerabilities.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Proofpoint has released patches for the affected versions, including version 8.20.0 patch 4570, to address the vulnerability. It is crucial for users to apply these patches promptly to safeguard their systems against potential exploitation.