Skip to main content

McAfee Email Gateway / Email and Web Security Appliance Multiple Vulnerabilities

Last Update Date: 19 Mar 2012 Release Date: 16 Mar 2012 5668 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in McAfee Email Gateway / Email and Web Security Appliance. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and view files on the target system.

 

The management console does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the management interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

 

  • A remote authenticated user can reset the passwords of other administrators.
  • A remote authenticated user can obtain active session tokens via the Dashboard.
  • A user can obtain password hashes from a system backup.
  • A remote authenticated user can submit a specially crafted URL to download arbitrary files from the target device.
  • A remote authenticated user can view arbitrary file contents with root privileges.

Impact

  • Cross-Site Scripting
  • Elevation of Privilege
  • Information Disclosure

System / Technologies affected

  • McAfee Email and Web Security Appliance version 5.5, 5.6
  • McAfee Email Gateway version 7.0

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • McAfee Email and Web Security Appliance
    Update to 5.5 Patch 6, 5.6 Patch 3.

  • McAfee Email Gateway
    Update to 7.0 Patch 1.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link