ID

VAR-201208-0452


CVE

CVE-2012-4580


TITLE

McAfee Email and Web Security and McAfee Email Gateway Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2012-003817

DESCRIPTION

Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard. A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process. Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions. Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application. Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: McAfee Email and Web Security Appliance and Email Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48406 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48406/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48406/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48406/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) An error in the reset password functionality can be exploited to reset the password of administrative users. 3) An error within the Dashboard discloses active session tokens and can be exploited to hijack another user's session. 4) The system backup stores passwords with weak encryption and can be exploited to decrypt the passwords via brute force attacks. 5) Certain unspecified input is not properly verified before being used to download files. This can be exploited to download arbitrary files from local resources via directory traversal sequences. 6) An unspecified error can be exploited to disclose the contents of files. Note: A weakness due to the server-side session remaining active has also been reported. SOLUTION: Update to a fixed version: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure ORIGINAL ADVISORY: https://kc.mcafee.com/corporate/index?page=content&id=SB10020 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-4580 // JVNDB: JVNDB-2012-003817 // BID: 52487 // VULHUB: VHN-57861 // VULMON: CVE-2012-4580 // PACKETSTORM: 110786

AFFECTED PRODUCTS

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 1.9

vendor:mcafeemodel:email and web securityscope:eqversion:5.0

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.5

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.6

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:ltversion:5.x

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:ltversion:5.6

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:5.5 patch 6

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:patch 1

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:ltversion:7.0

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:patch 3

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:6.7.1

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:eqversion:5.14

Trust: 0.3

vendor:mcafeemodel:email and web security appliancescope:eqversion:5.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:neversion:7.01

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.63

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.56

Trust: 0.3

sources: BID: 52487 // JVNDB: JVNDB-2012-003817 // CNNVD: CNNVD-201208-399 // NVD: CVE-2012-4580

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4580
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4580
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-399
value: MEDIUM

Trust: 0.6

VULHUB: VHN-57861
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-4580
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4580
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-57861
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57861 // VULMON: CVE-2012-4580 // JVNDB: JVNDB-2012-003817 // CNNVD: CNNVD-201208-399 // NVD: CVE-2012-4580

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-57861 // JVNDB: JVNDB-2012-003817 // NVD: CVE-2012-4580

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-399

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 110786 // CNNVD: CNNVD-201208-399

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003817

PATCH

title:SB10020url:https://kc.mcafee.com/corporate/index?page=content&id=SB10020

Trust: 0.8

sources: JVNDB: JVNDB-2012-003817

EXTERNAL IDS

db:NVDid:CVE-2012-4580

Trust: 2.6

db:MCAFEEid:SB10020

Trust: 2.2

db:BIDid:52487

Trust: 0.9

db:JVNDBid:JVNDB-2012-003817

Trust: 0.8

db:CNNVDid:CNNVD-201208-399

Trust: 0.7

db:CNNVDid:CNNVD-201203-306

Trust: 0.6

db:SECUNIAid:48406

Trust: 0.2

db:VULHUBid:VHN-57861

Trust: 0.1

db:VULMONid:CVE-2012-4580

Trust: 0.1

db:PACKETSTORMid:110786

Trust: 0.1

sources: VULHUB: VHN-57861 // VULMON: CVE-2012-4580 // BID: 52487 // JVNDB: JVNDB-2012-003817 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-399 // NVD: CVE-2012-4580

REFERENCES

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4580

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4580

Trust: 0.8

url:http://www.securityfocus.com/bid/52487

Trust: 0.6

url:http://www.mcafee.com/uk/products/email-and-web-security-appliance.aspx

Trust: 0.3

url:http://www.mcafee.com/us/products/email-gateway.aspx

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/48406/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48406/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48406

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57861 // VULMON: CVE-2012-4580 // BID: 52487 // JVNDB: JVNDB-2012-003817 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-399 // NVD: CVE-2012-4580

CREDITS

Ben Williams of NGS Secure

Trust: 0.9

sources: BID: 52487 // CNNVD: CNNVD-201203-306

SOURCES

db:VULHUBid:VHN-57861
db:VULMONid:CVE-2012-4580
db:BIDid:52487
db:JVNDBid:JVNDB-2012-003817
db:PACKETSTORMid:110786
db:CNNVDid:CNNVD-201203-306
db:CNNVDid:CNNVD-201208-399
db:NVDid:CVE-2012-4580

LAST UPDATE DATE

2025-04-11T22:49:26.479000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57861date:2012-08-22T00:00:00
db:VULMONid:CVE-2012-4580date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003817date:2012-08-24T00:00:00
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-399date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4580date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-57861date:2012-08-22T00:00:00
db:VULMONid:CVE-2012-4580date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003817date:2012-08-24T00:00:00
db:PACKETSTORMid:110786date:2012-03-14T05:16:49
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-399date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4580date:2012-08-22T10:42:04.710