header-logo
Suggest Exploit
vendor:
eTrust Security Command Center (eSCC) and eTrust Audit
by:
SecurityFocus
7.5
CVSS
HIGH
Information Disclosure, Arbitrary File Deletion, Replay Attack
20, 264, 346
CWE
Product Name: eTrust Security Command Center (eSCC) and eTrust Audit
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2004

CA eTrust Security Command Center (eSCC) and eTrust Audit Multiple Vulnerabilities

CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including an information-disclosure issue, an arbitrary-file-deletion issue, and a replay issue. These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols. An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

Mitigation:

Ensure that user input is properly validated and that user permissions are properly handled.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/20139/info
 
CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including:
 
- an information-disclosure issue
- an arbitrary-file-deletion issue
- a replay issue.
 
These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols.
 
An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

https://www.example.com:8080/etrust/servlet/eSMPAuditServlet?verb=getadhochtml&eSCCAdHocHtmlFile=../../../../../../../boot.ini