Executive Summary
Summary | |
---|---|
Title | McAfee ePolicy Orchestrator 4.6.4 and earlier pre-authenticated SQL injection and directory path traversal vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#209131 | First vendor Publication | 2013-04-29 |
Vendor | VU-CERT | Last vendor Modification | 2013-04-29 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.9 | Attack Range | Adjacent network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 5.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#209131McAfee ePolicy Orchestrator 4.6.4 and earlier pre-authenticated SQL injection and directory path traversal vulnerabilitiesOverviewMcAfee ePolicy Orchestrator 4.6.4 and earlier contains a pre-authenticated sql injection and directory path traversal vulnerability which could allow an attacker to inject malicious code into the system. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Jerome Nokin from Verizon Enterprise Solutions (GCIS Vulnerability Management) for discovering this vulnerability, and thanks to Thierry Zoller from Verizon Enterprise Solutions (GCIS Vulnerability Management) for reporting this vulnerability. This document was written by Michael Orlando. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/209131 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
50 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-04-28 | McAfee ePolicy Orchestrator 4.6.0-4.6.5 (ePowner) - Multiple Vulnerabilities |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-05-02 | IAVM : 2013-A-0098 - Multiple Vulnerabilities in McAfee ePolicy Orchestrator Severity : Category I - VMSKEY : V0037763 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28827 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28826 - Revision : 2 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28825 - Revision : 2 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28824 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28823 - Revision : 2 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28822 - Revision : 2 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator XSS attempt RuleID : 28821 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | McAfee ePolicy Orchestrator timing based injection attempt RuleID : 27724 - Revision : 2 - Type : SQL |
2014-01-10 | McAfee ePolicy Orchestrator timing based injection attempt RuleID : 27723 - Revision : 2 - Type : SQL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-05-04 | Name : A security management application on the remote host has multiple vulnerabili... File : mcafee_epo_sb10042.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-05-10 09:27:02 |
|
2014-02-17 12:07:35 |
|
2013-05-16 17:18:11 |
|
2013-05-11 05:18:19 |
|
2013-05-01 17:24:12 |
|
2013-04-29 17:18:27 |
|