First published: Fri Mar 09 2018(Updated: )
Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | =5.3.0 | |
Trellix ePolicy Orchestrator | =5.3.1 | |
Trellix ePolicy Orchestrator | =5.3.2 | |
Trellix ePolicy Orchestrator | =5.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6660 has a severity rating that indicates a directory traversal vulnerability in specific versions of McAfee ePolicy Orchestrator.
To mitigate CVE-2018-6660, upgrade to the latest version of McAfee ePolicy Orchestrator that addresses this vulnerability.
CVE-2018-6660 affects McAfee ePolicy Orchestrator versions 5.3.0, 5.3.1, 5.3.2, and 5.9.0.
CVE-2018-6660 is classified as a directory traversal vulnerability.
Yes, CVE-2018-6660 could allow an attacker to bypass file extension restrictions, potentially leading to unauthorized access.