Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Vulnerabilities in CA eTrust Security Command Center and eTrust Audit - exploit.company
header-logo
Suggest Exploit
vendor:
eTrust Security Command Center, eTrust Audit
by:
Unknown
N/A
CVSS
N/A
Information disclosure, arbitrary file deletion, replay
CWE
Product Name: eTrust Security Command Center, eTrust Audit
Affected Version From:
Affected Version To:
Patch Exists: Unknown
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Vulnerabilities in CA eTrust Security Command Center and eTrust Audit

The vulnerabilities in CA eTrust Security Command Center and eTrust Audit are due to the lack of user input validation and design errors in user permissions and secure data-transmission protocols. An attacker can exploit these vulnerabilities to access sensitive information, delete files, and carry out replay attacks.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/20139/info
 
CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including:
 
- an information-disclosure issue
- an arbitrary-file-deletion issue
- a replay issue.
 
These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols.
 
An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

The following command-line example will send a login-failure event:
etsapisend.exe -nod $dstIP -cat "System Access" -opr Logon -sta F -nam NT-Security -loc \\Domain\IIS_Server -usr System -evt 70 -src Security -nid 529 -inf "Logon Failure"