Proofpoint Enterprise Protection HTML Injection in Email Body Through Email Subject Vulnerability, CVE-2023-5770
Advisory ID: PFPT-SA-2023-0009
Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.
This vulnerability is identified by CVE-2023-5770. Proofpoint has released patches to address this issue.
This vulnerability has been assigned a CVSS score of 5.3 MEDIUM:
Proofpoint has released fixed software versions:
8.20.2 patch 4809
8.20.0 patch 4805
8.18.6 patch 4804
All versions below the listed patch levels are vulnerable, including end-of-life software. The fixed software versions are now available through the customer support portal.
Proofpoint On-Demand Customers
No action is required. Applicable fixes have already been deployed by Proofpoint.
Proofpoint On-Premises Customers
If you are running a supported version that is configured to deploy releases automatically, no action is required. Applicable fixes have been automatically deployed.
For on-premise environments that are configured to manually apply releases, install the applicable release as noted above.
If you are running an end of life release please upgrade to a supported release as soon as possible.
For any questions or concerns please contact Proofpoint Support.
|January 9, 2024
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. PROOFPOINT RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for authorized subscribers to Proofpoint products and services.