Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
Link | Tags |
---|---|
http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt | exploit patch vendor advisory |
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9 | exploit patch vendor advisory |
http://securitytracker.com/id?1016910 | vdb entry |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617 | patch vendor advisory |
http://secunia.com/advisories/22023 | exploit third party advisory patch vendor advisory |
http://www.osvdb.org/29010 | exploit vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29104 | vdb entry |
http://www.securityfocus.com/bid/20139 | vdb entry |
http://www.securityfocus.com/archive/1/446716/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/446611/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/3738 | vdb entry |