CVE-2018-6660

Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:00

Type Values Removed Values Added
References (BID) http://www.securityfocus.com/bid/103392 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103392 -
References (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10228 - Vendor Advisory () https://kc.mcafee.com/corporate/index?page=content&id=SB10228 -
References (SECTRACK) http://www.securitytracker.com/id/1040884 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040884 -

Information

Published : 2018-04-02 13:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-6660

Mitre link : CVE-2018-6660

CVE.ORG link : CVE-2018-6660


JSON object : View

Products Affected

mcafee

  • epolicy_orchestrator
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')