Proofpoint Enterprise Protection (PPS/PoD) perl eval() arbitrary command execution, CVE-2022-46333
Advisory ID: PFPT-SA-2022-0003
The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope.
This affects all versions 8.19.0 and below.
This vulnerability is identified by CVE-2022-46333. Proofpoint has released patches to address this issue. If you are running an end of life version, please upgrade to a fully supported version as soon as possible.
This vulnerability has been assigned a CVSS score of 7.2:
Proofpoint has released the following patches:
8.19.0 patch 4546
8.18.6 patch 4545
8.18.4 patch 4544
8.13.22 patch 4543
The patches are now available through the customer support portal.
Proofpoint On-Demand Customers
No action is required. Applicable fixes have already been deployed by Proofpoint.
Proofpoint On-Premises Customers
If you are running a supported version that is configured to deploy releases automatically, no action is required. Applicable fixes have been automatically deployed.
For on-premise environments that are configured to manually apply releases, install the applicable release as noted above.
If you are running an end of life release please upgrade to a supported release as soon as possible.
For any questions or concerns please contact Proofpoint Support.
Thanks to ly1g3 for their co-ordinated disclosure of this issue.
|1.0||Initial Release||December 6, 2022|
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.