First published: Sun Jul 21 2013(Updated: )
Multiple SQL injection vulnerabilities in McAfee ePolicy Orchestrator 4.6.6 and earlier, and the ePolicy Orchestrator (ePO) extension for McAfee Agent (MA) 4.5 and 4.6, allow remote authenticated users to execute arbitrary SQL commands via the uid parameter to (1) core/showRegisteredTypeDetails.do and (2) EPOAGENTMETA/DisplayMSAPropsDetail.do, a different vulnerability than CVE-2013-0140.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee ePolicy Orchestrator | <=4.6.6 | |
McAfee ePolicy Orchestrator | =4.6.0 | |
McAfee ePolicy Orchestrator | =4.6.1 | |
McAfee ePolicy Orchestrator | =4.6.2 | |
McAfee ePolicy Orchestrator | =4.6.3 | |
McAfee ePolicy Orchestrator | =4.6.4 | |
McAfee ePolicy Orchestrator | =4.6.5 | |
Trellix ePolicy Orchestrator | =4.5 | |
Trellix ePolicy Orchestrator | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4882 has a CVSS score that indicates a medium severity due to its potential impact from SQL injection vulnerabilities.
To mitigate CVE-2013-4882, users should upgrade to the latest version of McAfee ePolicy Orchestrator beyond version 4.6.6.
CVE-2013-4882 affects McAfee ePolicy Orchestrator versions 4.6.6 and earlier, as well as the ePolicy Orchestrator extension for McAfee Agent versions 4.5 and 4.6.
Yes, CVE-2013-4882 can be exploited remotely by authenticated users to execute arbitrary SQL commands.
CVE-2013-4882 is classified as a SQL injection vulnerability.