SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   McAfee Asset Manager Vendors:   McAfee
McAfee Asset Manager Input Validation Flaws Let Remote Authenticated Users Inject SQL Commands and Download Files
SecurityTracker Alert ID:  1029927
SecurityTracker URL:  http://securitytracker.com/id/1029927
CVE Reference:   CVE-2014-2587, CVE-2014-2588   (Links to External Site)
Updated:  Apr 11 2014
Original Entry Date:  Mar 18 2014
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 6.5.x, 6.6.126
Description:   Two vulnerabilities were reported in McAfee Asset Manager. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

A remote authenticated user can supply a specially crafted request to exploit a flaw in the 'downloadReport' function and view arbitrary files on target system [CVE-2014-2588].

A demonstration HTTP GET request URL is provided:

/servlet/downloadReport?reportFileName=../../../../../../../../etc/passwd&format=CSV

A remote authenticated user can supply a specially crafted 'user' parameter value to the 'ReportsAudit.jsp' script to execute SQL commands on the underlying database [CVE-2014-2587].

Impact:   A remote authenticated user can execute SQL commands on the underlying database.

A remote authenticated user can view files on the target system.

Solution:   The vendor has issued a fix (6.6.141).

The vendor's advisory is available at:

https://kc.mcafee.com/corporate/index?page=content&id=SB10070

Vendor URL:  kc.mcafee.com/corporate/index?page=content&id=SB10070 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC