Proofpoint Enterprise Protection perl eval vulnerabilities, CVE-2023-0089/CVE-2023-0090
Advisory ID: PFPT-SA-2023-0001
Proofpoint Enterprise Protection contains perl eval vulnerabilities allowing for remote code execution.
These vulnerabilities affect all versions 8.20.0 and below.
Vulnerability Information
Proofpoint Enterprise Protection webutils authenticated RCE, CVE-2023-0089
CVE-2023-0089 describes a vulnerability which allows for remote code execution by an authenticated user. Patches are available.
This vulnerability has been assigned a CVSS score of 8.8 (HIGH):
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Proofpoint Enterprise Protection webservices unauthenticated RCE, CVE-2023-0090
CVE-2023-0090 describes a vulnerability which allows for remote code execution by an anonymous user. The vulnerability does require access to the webservices API to be exploitable but such access requires non-standard configuration. Patches are available.
This vulnerability has been assigned a CVSS score of 9.8 (CRITICAL):
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Fixed Software
Proofpoint has released the following patches:
8.20.0 patch 4583
8.18.6 patch 4582
8.18.4 patch 4580
8.13.22 patch 4603
The patches are now available through the customer support portal.
Proofpoint On-Demand Customers
No action is required. Applicable fixes have already been deployed by Proofpoint.
Proofpoint On-Premises Customers
If you are running a supported version that is configured to deploy releases automatically, no action is required. Applicable fixes have been automatically deployed.
For on-premise environments that are configured to manually apply releases, install the applicable release as noted above.
If you are running an end of life release please upgrade to a supported release as soon as possible.
For any questions or concerns please contact Proofpoint Support.
Acknowledgments
Thanks to ly1g3 for their co-ordinated disclosure of this issue.
URL
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0001
Revision History
Version | Description | Section | Date |
---|---|---|---|
1.0 | Initial Release | March 7, 2022 | |
2.0 | Updated CVSS score based on CVMAP feedback | Vulnerability Information | July 12, 2023 |
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.