CVE-2018-6660

Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file.
References
Link Resource
https://kc.mcafee.com/corporate/index?page=content&id=SB10228 Vendor Advisory
http://www.securityfocus.com/bid/103392 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040884 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.0:*:*:*:*:*:*:*

Information

Published : 2018-04-02 13:29

Updated : 2019-10-09 23:41


NVD link : CVE-2018-6660

Mitre link : CVE-2018-6660


JSON object : View

Products Affected

mcafee

  • epolicy_orchestrator
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')