McAfee ePolicy Orchestrator 5.1.x < 5.1.3 HF1193124 / 5.3.x < 5.3.1 HF1194398 / 5.3.2 < 5.3.2 HF1193123 / 5.9.x < 5.9.0 HF1193951 Path Traversal RCE (SB10196)

high Nessus Plugin ID 100572

Synopsis

A security management application installed on the remote Windows host is affected by a remote code execution vulnerability.

Description

The version of McAfee ePolicy Orchestrator (ePO) installed on the remote Windows host is 5.1.x prior to 5.1.3 hotfix 1193124, 5.3.x prior to 5.3.1 hotfix 1194398, 5.3.2 prior to 5.3.2 hotfix 1193123, or 5.9.x prior to 5.9.0 hotfix 1193951. It is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input. An authenticated, remote attacker can exploit this, via a specially crafted request that uses directory traversal, to execute arbitrary commands.

Solution

Upgrade to McAfee ePO version 5.1.3 hotfix 1193124 / 5.3.1 hotfix 1194398 / 5.3.2 hotfix 1193123 / 5.9.0 hotfix 1193951 or later.

See Also

https://kc.mcafee.com/corporate/index?page=content&id=SB10196

Plugin Details

Severity: High

ID: 100572

File Name: mcafee_epo_sb10196.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 6/1/2017

Updated: 11/13/2019

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2017-3980

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:epolicy_orchestrator

Required KB Items: SMB/Registry/Enumerated, installed_sw/McAfee ePO

Exploit Ease: No known exploits are available

Patch Publication Date: 5/18/2017

Vulnerability Publication Date: 5/18/2017

Reference Information

CVE: CVE-2017-3980

BID: 98559

MCAFEE-SB: SB10196