XML external entity (XXE) vulnerability in the Server Task Log in McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 allows remote authenticated users to read arbitrary files via the conditionXML parameter to the taskLogTable to orionUpdateTableFilter.do.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2015/Jan/37 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2015/Jan/8 | Mailing List Third Party Advisory |
http://secunia.com/advisories/61922 | |
http://www.securitytracker.com/id/1031519 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99950 | |
https://gist.github.com/brandonprry/692e553975bf29aeaf2c | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10095 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-01-09 18:59
Updated : 2017-09-08 01:29
NVD link : CVE-2015-0921
Mitre link : CVE-2015-0921
CVE.ORG link : CVE-2015-0921
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
CWE