McAfee Email Gateway / Email and Web Security Appliance Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities have been identified in McAfee Email Gateway / Email and Web Security Appliance. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and view files on the target system.
The management console does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the management interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
- A remote authenticated user can reset the passwords of other administrators.
- A remote authenticated user can obtain active session tokens via the Dashboard.
- A user can obtain password hashes from a system backup.
- A remote authenticated user can submit a specially crafted URL to download arbitrary files from the target device.
- A remote authenticated user can view arbitrary file contents with root privileges.
Impact
- Cross-Site Scripting
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- McAfee Email and Web Security Appliance version 5.5, 5.6
- McAfee Email Gateway version 7.0
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
McAfee Email and Web Security Appliance
Update to 5.5 Patch 6, 5.6 Patch 3.McAfee Email Gateway
Update to 7.0 Patch 1.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with