Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file.
References
Link | Resource |
---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10228 | Vendor Advisory |
http://www.securityfocus.com/bid/103392 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040884 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-04-02 06:29
Updated : 2019-10-09 16:41
NVD link : CVE-2018-6660
Mitre link : CVE-2018-6660
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
mcafee
- epolicy_orchestrator