McAfee ePolicy Orchestrator Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks
SecurityTracker Alert ID: 1028803|
SecurityTracker URL: http://securitytracker.com/id/1028803
(Links to External Site)
Updated: Jul 22 2013|
Original Entry Date: Jul 17 2013
Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 4.6.6 and prior|
Several vulnerabilities were reported in McAfee ePolicy Orchestrator. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands.|
Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-4883]. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the ePolicy Orchestrator software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. Nuri Fattah of NATO/NCIRC reported this vulnerability.
The vendor was notified of the cross-site scripting vulnerabilities on June 12, 2013.
The software does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database [CVE-2013-4882]. Sasha Zivojinovic from Gotham Digital Science reported this vulnerability.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the ePolicy Orchestrator software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
A remote user can execute SQL commands on the underlying database.
The vendor has issued a patch for the SQL injection vulnerabilities (see SB10043).|
The vendor plans to issue a fix for the cross-site scripting vulnerabilities in version 4.6.7, tentatively scheduled for release in late Q3 2013.
The vendor's advisories are available at:
Vendor URL: kc.mcafee.com/corporate/index?page=content&id=KB78824 (Links to External Site)
Input validation error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: Multiple vulnerabilities in McAfee ePO 4.6.6|
Classification: NON SENSITIVE INFORMATION RELEASABLE TO THE PUBLIC
Multiple vulnerabilities in McAfee ePO 4.6.6
McAfee ePO 4.6.6 Build 176 & (potentially) earlier versions
08 June 2013 - Vulnerability found
12 June 2013 - Vendor informed
12 June 2013 - Vendor replied/confirmed & opened service ticket
12 July 2013 - Vendor responded with dates for solutions
Nuri Fattah of NATO / NCIRC (www.ncirc.nato.int)
CVE: To be assigned
NCIRC ID: NCIRC-2013127-01
Multiple vulnerabilities, such as Cross-Site Scripting (XSS) and SQL
injection were identified in the latest version of McAfee ePO (4.6.6).
All identified vulnerabilities were discovered post authentication.
1. SQL injection
Item "a" will be addressed in ePO 4.6.7 due out in late Q3 2013.
Item "b" has been addressed per Security Bulletin SB10043.
2. Reflected XSS
a. POST /core/loadDisplayType.do HTTP/1.1=20
b. POST /console/createDashboardContainer.do HTTP/1.1
c. POST /console/createDashboardContainer.do HTTP/1.1
Each of these items will be addressed in ePO 4.6.7 due out in late Q3