CVE-2016-9148
CVSS4.3
发布时间 :2017-03-07 10:59:00
修订时间 :2017-03-07 20:41:08
NMPS    

[原文]Cross-site scripting (XSS) vulnerability in CA Service Desk Manager (formerly CA Service Desk) 12.9 and 14.1 allows remote attackers to inject arbitrary web script or HTML via the QBE.EQ.REF_NUM parameter.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)

cpe:/a:ca:service_desk_manager:12.9
cpe:/a:ca:service_desk_manager:14.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9148
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9148
(官方数据源) NVD

- 其它链接及资源

http://packetstormsecurity.com/files/139660/CA-Service-Desk-Manaager-12.9-14.1-Code-Execution.html
(VENDOR_ADVISORY)  MISC  http://packetstormsecurity.com/files/139660/CA-Service-Desk-Manaager-12.9-14.1-Code-Execution.html
http://seclists.org/fulldisclosure/2016/Nov/53
(VENDOR_ADVISORY)  FULLDISC  20161110 CA11/09/2016-02: Security Notice for CA Service Desk Manager
http://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-02-security-notice-for-ca-service-desk-manager.html
(VENDOR_ADVISORY)  CONFIRM  http://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-02-security-notice-for-ca-service-desk-manager.html
http://www.securityfocus.com/bid/94258
(VENDOR_ADVISORY)  BID  94258
http://www.securitytracker.com/id/1037262
(VENDOR_ADVISORY)  SECTRACK  1037262

- 漏洞信息 (F139660)

CA Service Desk Manaager 12.9 / 14.1 Code Execution (PacketStormID:F139660)
2016-11-10 00:00:00
Ken Williams  www3.ca.com
advisory,remote,web,arbitrary,xss
CVE-2016-9148
[点击下载]

CA Technologies Support is alerting customers to a vulnerability in CA Service Desk Manager (formerly CA Service Desk). A reflected cross site scripting vulnerability, CVE-2016-9148, exists in the QBE.EQ.REF_NUM parameter of the SDM web interface. A remote attacker, who can trick a user into clicking on or visiting a specially crafted link, could potentially execute arbitrary code on the targeted user's system. CA Technologies has assigned a Medium risk rating to this vulnerability. A solution is available.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

CA20161109-02: Security Notice for CA Service Desk Manager

Issued: November 09, 2016

CA Technologies Support is alerting customers to a vulnerability in CA 
Service Desk Manager (formerly CA Service Desk).  A reflected cross site 
scripting vulnerability, CVE-2016-9148, exists in the QBE.EQ.REF_NUM 
parameter of the SDM web interface.  A remote attacker, who can trick a 
user into clicking on or visiting a specially crafted link, could 
potentially execute arbitrary code on the targeted user's system.  CA 
Technologies has assigned a Medium risk rating to this vulnerability.  
A solution is available.


Risk Rating

Medium


Platform(s)

All


Affected Products

CA Service Desk Manager 12.9, 14.1


How to determine if the installation is affected

Check the web.cfg file for the existence of the solution detailed in KB 
article TEC1774903.


Solution 

Implement the solution detailed in KB article TEC1774903.


Workaround

None


References

CVE-2016-9148 - SDM QBE.EQ.REF_NUM Reflected XSS Vulnerability


Acknowledgement

CVE-2016-9148 - Jerold Hoong


Change History

Version 1.0:  Initial Release, 2016-11-09


If additional information is required, please contact CA Technologies 
Support at https://support.ca.com/

If you discover a vulnerability in CA Technologies products, please report 
your findings to the CA Technologies Product Vulnerability Response Team 
at vuln <AT> ca.com

CA Technologies Security Notices can be found at https://support.ca.com/
CA Product Vulnerability Response Team PGP Key:
https://www.ca.com/us/support/ca-support-online/documents.aspx?id=177782


Regards,

Ken Williams
Vulnerability Response Director, CA Product Vulnerability Response Team


Copyright (c) 2016 CA. All Rights Reserved. 520 Madison Avenue, 22nd 
Floor, New York, NY 10022. All other trademarks, trade names, service 
marks, and logos referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 16620)
Charset: utf-8
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=wAmu
-----END PGP SIGNATURE-----
    

- 漏洞信息

Computer Associates Service Desk Manager CVE-2016-9148 Cross Site Scripting Vulnerability
Input Validation Error 94258
Yes No
2016-11-09 12:00:00 2016-11-11 03:06:00
Jerold Hoong.

- 受影响的程序版本

Ca Service Desk Manager 14.1
Ca Service Desk Manager 12.9

- 漏洞讨论

Computer Associates Service Desk Manager is prone to an cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Computer Associates Service Desk Manager 12.9 and 14.1 are vulnerable.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站