Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["x86"], "product": "ePolicy Orchestrator (ePO)", "vendor": "McAfee", "versions": [{"lessThan": "5.3.3", "status": "affected", "version": "5.1", "versionType": "custom"}, {"lessThan": "5.3.3", "status": "affected", "version": "5.3", "versionType": "custom"}, {"lessThan": "5.9.1", "status": "affected", "version": "5.9", "versionType": "custom"}]}], "datePublic": "2018-02-23T00:00:00", "descriptions": [{"lang": "en", "value": "OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output."}], "metrics": [{"cvssV3_0": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"description": "OS Command Injection vulnerability", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-06-14T09:57:01", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix"}, "references": [{"name": "103155", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/103155"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10227"}], "source": {"advisory": "SB10227", "discovery": "INTERNAL"}, "title": "McAfee ePolicy Orchestrator (ePO) - OS Command Injection vulnerability", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2017-3936", "STATE": "PUBLIC", "TITLE": "McAfee ePolicy Orchestrator (ePO) - OS Command Injection vulnerability"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "ePolicy Orchestrator (ePO)", "version": {"version_data": [{"affected": "<", "platform": "x86", "version_affected": "<", "version_name": "5.1", "version_value": "5.3.3"}, {"affected": "<", "platform": "x86", "version_affected": "<", "version_name": "5.3", "version_value": "5.3.3"}, {"affected": "<", "platform": "x86", "version_affected": "<", "version_name": "5.9", "version_value": "5.9.1"}]}}]}, "vendor_name": "McAfee"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output."}]}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "OS Command Injection vulnerability"}]}]}, "references": {"reference_data": [{"name": "103155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103155"}, {"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10227", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10227"}]}, "source": {"advisory": "SB10227", "discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T14:39:41.148Z"}, "title": "CVE Program Container", "references": [{"name": "103155", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/103155"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10227"}]}]}, "cveMetadata": {"assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2017-3936", "datePublished": "2018-06-13T21:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.148Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}