XML external entity (XXE) vulnerability in the Server Task Log in McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 allows remote authenticated users to read arbitrary files via the conditionXML parameter to the taskLogTable to orionUpdateTableFilter.do.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2015/Jan/37 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2015/Jan/8 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/61922 - | |
References | () http://www.securitytracker.com/id/1031519 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/99950 - | |
References | () https://gist.github.com/brandonprry/692e553975bf29aeaf2c - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10095 - Patch, Vendor Advisory |
Information
Published : 2015-01-09 18:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-0921
Mitre link : CVE-2015-0921
CVE.ORG link : CVE-2015-0921
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
CWE