Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.EPOLICY_ORCHESTRATOR_LOCAL_INFO_DISCLOSURE.NASL
HistorySep 01, 2005 - 12:00 a.m.

ePolicy Orchestrator Symlink Arbitrary Privileged File Access

2005-09-0100:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
18

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

The remote host is running ePolicy Orchestrator / ProtectionPilot, a system security management solution from McAfee.

According to its banner, the Common Management Agent (CMA) associated with ePolicy Orchestrator / ProtectionPilot on the remote host can be used by local users to view files residing on the same partition as the affected application with LocalSystem level privileges by creating symbolic links in the agent’s web root directory. This may enable them to read files to which they would not otherwise have access.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(19552);
  script_version("1.17");
  script_cvs_date("Date: 2018/07/10 14:27:33");

  script_cve_id("CVE-2005-2554");
  script_bugtraq_id(14549);

  script_name(english:"ePolicy Orchestrator Symlink Arbitrary Privileged File Access");
  script_summary(english:"Checks for local information disclosure vulnerability in ePolicy Orchestrator");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to an information disclosure
vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host is running ePolicy Orchestrator / ProtectionPilot, a
system security management solution from McAfee. 

According to its banner, the Common Management Agent (CMA) associated
with ePolicy Orchestrator / ProtectionPilot on the remote host can be
used by local users to view files residing on the same partition as
the affected application with LocalSystem level privileges by creating
symbolic links in the agent's web root directory.  This may enable
them to read files to which they would not otherwise have access.");
  script_set_attribute(attribute:"see_also", value:"http://reedarvin.thearvins.com/20050811-01.html");
  script_set_attribute(attribute:"see_also", value:"http://knowledge.mcafee.com/article/430/KB42216_f.SAL_Public.html");
  script_set_attribute(attribute:"solution", value:
"Apply CMA 3.5 Patch 4 as described in the vendor's advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/01");
  script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/11");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:epolicy_orchestrator");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 8081);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:8081);

# Grab the initial page.
res = http_get_cache(item:"/", port:port, exit_on_fail: 1);


# There's a problem if ...
if (
  # it looks like EPO and...
  '<?xml-stylesheet type="text/xsl" href="FrameworkLog.xsl"?>' >< res &&
  egrep(string:res, pattern:"^ +<Log component=.+</Log") &&
  # the version is below 3.5.0.508 (ie, 3.5.0 patch 4)
  egrep(string:res, pattern:"^ +<version>3\.([0-4]\..*|5\.0\.([0-4].*|50[0-7]))<")
) {
  security_warning(port);
}
VendorProductVersionCPE
mcafeeepolicy_orchestratorcpe:/a:mcafee:epolicy_orchestrator

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

Related for EPOLICY_ORCHESTRATOR_LOCAL_INFO_DISCLOSURE.NASL