First published: Tue Mar 18 2014(Updated: )
Directory traversal vulnerability in McAfee Web Gateway (MWG) 7.4.x before 7.4.1, 7.3.x before 7.3.2.6, and 7.2.0.9 and earlier allows remote authenticated users to read arbitrary files via a crafted request to the web filtering port.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Web Gateway | >=7.2.0<=7.2.0.9 | |
McAfee Web Gateway | >=7.3.2<7.3.2.6 | |
McAfee Web Gateway | >=7.4.0<7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2535 is categorized as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2014-2535, update McAfee Web Gateway to version 7.4.1 or later, 7.3.2.6 or later, or 7.2.0.9 or later.
CVE-2014-2535 affects McAfee Web Gateway versions 7.2.0.9 and earlier, 7.3.2.6 and earlier, and 7.4.0 and earlier.
Remote authenticated users can exploit CVE-2014-2535 to read arbitrary files through crafted requests.
In the context of CVE-2014-2535, a directory traversal vulnerability allows attackers to access files and directories outside the intended file system path.