First published: Fri Jan 09 2015(Updated: )
XML external entity (XXE) vulnerability in the Server Task Log in McAfee ePolicy Orchestrator (ePO) before 4.6.9 and 5.x before 5.1.2 allows remote authenticated users to read arbitrary files via the conditionXML parameter to the taskLogTable to orionUpdateTableFilter.do.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | <=4.6.8 | |
Trellix ePolicy Orchestrator | =5.0.0 | |
Trellix ePolicy Orchestrator | =5.0.1 | |
Trellix ePolicy Orchestrator | =5.1.0 | |
Trellix ePolicy Orchestrator | =5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0921 has a medium severity rating due to its potential for information disclosure.
To fix CVE-2015-0921, upgrade to McAfee ePolicy Orchestrator version 4.6.9 or 5.1.2 or later.
CVE-2015-0921 affects all versions of McAfee ePolicy Orchestrator prior to 4.6.9 and 5.x before 5.1.2.
CVE-2015-0921 is an XML External Entity (XXE) vulnerability that allows remote file access.
Yes, remote authenticated users can exploit CVE-2015-0921 to read arbitrary files.