XML external entity (XXE) vulnerability in the Server Task Log in McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 allows remote authenticated users to read arbitrary files via the conditionXML parameter to the taskLogTable to orionUpdateTableFilter.do.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html | Exploit Third Party Advisory VDB Entry |
https://kc.mcafee.com/corporate/index?page=content&id=SB10095 | Patch Vendor Advisory |
http://seclists.org/fulldisclosure/2015/Jan/8 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2015/Jan/37 | Mailing List Third Party Advisory |
https://gist.github.com/brandonprry/692e553975bf29aeaf2c | |
http://www.securitytracker.com/id/1031519 | |
http://secunia.com/advisories/61922 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99950 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2015-01-09 10:59
Updated : 2017-09-07 18:29
NVD link : CVE-2015-0921
Mitre link : CVE-2015-0921
JSON object : View
CWE
Products Affected
mcafee
- epolicy_orchestrator