CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Web Server Full Path Disclosure

Author: Patrick Webster
type: remote
platform: windows
port: 
date_added: 2006-09-21  
date_updated: 2013-09-30  
verified: 1  
codes: CVE-2006-4899;OSVDB-29009  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28640.txt  
source: https://www.securityfocus.com/bid/20139/info

CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including:

- an information-disclosure issue
- an arbitrary-file-deletion issue
- a replay issue.

These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols.

An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

https://www.example.com:8080/etrust/servlet/ePPIServlet?PIProfile=eAV_Report's&PIName=Generate+Pre-7.1+Report+Data&profile= Threat+Management&node=