ePolicy Orchestrator Symlink Arbitrary Privileged File Access

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server is prone to an information disclosure
vulnerability.

Description :

The remote host is running ePolicy Orchestrator / ProtectionPilot, a
system security management solution from McAfee.

According to its banner, the Common Management Agent (CMA) associated
with ePolicy Orchestrator / ProtectionPilot on the remote host can be
used by local users to view files residing on the same partition as
the affected application with LocalSystem level privileges by creating
symbolic links in the agent's web root directory. This may enable
them to read files to which they would not otherwise have access.

See also :

http://reedarvin.thearvins.com/20050811-01.html
http://knowledge.mcafee.com/article/430/KB42216_f.SAL_Public.html

Solution :

Apply CMA 3.5 Patch 4 as described in the vendor's advisory.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N)
CVSS Temporal Score : 4.7
(CVSS2#E:H/RL:W/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 19552 (epolicy_orchestrator_local_info_disclosure.nasl)

Bugtraq ID: 14549

CVE ID: CVE-2005-2554