Vulnerabilities > CVE-2003-0148 - Unspecified vulnerability in Mcafee Epolicy Orchestrator

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
mcafee
nessus

Summary

The default installation of MSDE via McAfee ePolicy Orchestrator 2.0 through 3.0 allows attackers to execute arbitrary code via a series of steps that (1) obtain the database administrator username and encrypted password in a configuration file from the ePO server using a certain request, (2) crack the password due to weak cryptography, and (3) use the password to pass commands through xp_cmdshell.

Nessus

NASL familyWeb Servers
NASL idEPOLICY_ORCHESTRATOR_MULTIPLE_ISSUES.NASL
descriptionAccording to its banner, the remote version of ePolicy Orchestrator has multiple vulnerabilities which may allow an attacker to gain information on the MSDE installation of this host, or even execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id11812
published2003-07-31
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11812
titleePolicy Orchestrator Multiple Remote Vulnerabilities (OF, FS)
code
# 
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
 script_id(11812);
 script_version ("1.21");
 script_cvs_date("Date: 2018/07/10 14:27:33");

 script_cve_id("CVE-2003-0148", "CVE-2003-0149", "CVE-2003-0616");
 script_bugtraq_id(8316, 8318, 8319);

 script_name(english:"ePolicy Orchestrator Multiple Remote Vulnerabilities (OF, FS)");
 script_summary(english:"ePolicy Orchestrator vulnerable to several issues");
 
 script_set_attribute(
  attribute:"synopsis",
  value:"The remote web server has multiple vulnerabilities."
 );
 script_set_attribute(
  attribute:"description",
  value:
"According to its banner, the remote version of ePolicy Orchestrator
has multiple vulnerabilities which may allow an attacker to gain
information on the MSDE installation of this host, or even execute
arbitrary code."
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to the latest version of this software."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/07/31");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/07/31");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:epolicy_orchestrator");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Web Servers");

 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");

 script_require_ports("Services/www", 8081);
 script_dependencie("find_service1.nasl", "httpver.nasl", "http_version.nasl");

 exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


function check(port)
{
 local_var banner, req, res;
 
 if ( get_kb_item("Services/www/" + port + "/broken") ) return 0;
 banner = get_http_banner(port:port);
 if ( ! banner || "Server: Spipe/1.0" >!< banner ) return 0;

 res = http_send_recv3(method:"GET", item:"/SERVER.INI", port:port);
 if (isnull(res)) exit(0);

 if(("DataSource" >< res && "AgentHttpPort" >< res && "MaxHttpConnection" >< res) ||
   ("Server: Spipe/1.0" >< res && "MIME-version: 1.0" >< res))
 {
  security_hole(port);
 }

 return(0);
}


#
# Execution begins here
#
ports = add_port_in_list(list:get_kb_list("Services/www"), port:8081);
foreach port (ports)
{
 if ( get_port_state(port) ) check(port:port);
}