Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103392 - | |
References | () http://www.securitytracker.com/id/1040884 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10228 - | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.2 |
07 Nov 2023, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10228 - | |
References | () http://www.securityfocus.com/bid/103392 - | |
References | () http://www.securitytracker.com/id/1040884 - |
Information
Published : 2018-04-02 13:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-6660
Mitre link : CVE-2018-6660
CVE.ORG link : CVE-2018-6660
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')