CVE-2018-8953
CVSS6.5
发布时间 :2018-04-11 13:29:00
修订时间 :2018-05-17 13:42:03
NMPS    

[原文]CA Workload Automation AE before r11.3.6 SP7 allows remote attackers to a perform SQL injection via a crafted HTTP request.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 6.5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: SINGLE_INSTANCE [--]

- CWE (弱点类目)

CWE-89 [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)]

- CPE (受影响的平台与产品)

cpe:/a:ca:workload_automation_ae:r11.3.6
cpe:/a:ca:workload_automation_ae:r11.3.6:sp1
cpe:/a:ca:workload_automation_ae:r11.3.6:sp2
cpe:/a:ca:workload_automation_ae:r11.3.6:sp3
cpe:/a:ca:workload_automation_ae:r11.3.6:sp4
cpe:/a:ca:workload_automation_ae:r11.3.6:sp5
cpe:/a:ca:workload_automation_ae:r11.3.6:sp6

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8953
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8953
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/103742
(VENDOR_ADVISORY)  BID  103742
http://www.securitytracker.com/id/1040605
(VENDOR_ADVISORY)  SECTRACK  1040605
https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180329-01--security-notice-for-ca-workload-automation-ae.html
(VENDOR_ADVISORY)  CONFIRM  https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180329-01--security-notice-for-ca-workload-automation-ae.html

- 漏洞信息 (F146963)

CA Workload Automation AE / CA Workload Control Center SQL Injection / Code Execution (PacketStormID:F146963)
2018-03-30 00:00:00
Ken Williams  www3.ca.com
advisory,remote,vulnerability,code execution,sql injection
CVE-2018-8953,CVE-2018-8954
[点击下载]

CA Technologies Support is alerting customers to two potential risks with CA Workload Automation AE and CA Workload Control Center. Two vulnerabilities exist that can allow a remote attacker to conduct SQL injection attacks or execute code remotely. The first vulnerability in CA Workload Automation AE has a medium risk rating and concerns insufficient data validation that can allow an authenticated remote attacker to conduct SQL injection attacks. The second vulnerability in CA Workload Control Center has a high risk rating and concerns an Apache MyFaces configuration that can allow an authenticated remote attacker to conduct remote code execution attacks.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

CA20180329-01: Security Notice for CA Workload Automation AE and CA 
Workload Control Center

Issued: March 29, 2018
Last Updated: March 29, 2018

CA Technologies Support is alerting customers to two potential risks 
with CA Workload Automation AE and CA Workload Control Center. Two 
vulnerabilities exist that can allow a remote attacker to conduct SQL 
injection attacks or execute code remotely.

The first vulnerability, CVE-2018-8953, in CA Workload Automation AE, 
has a medium risk rating and concerns insufficient data validation 
that can allow an authenticated remote attacker to conduct SQL 
injection attacks.

The second vulnerability, CVE-2018-8954, in CA Workload Control 
Center, has a high risk rating and concerns an Apache MyFaces 
configuration that can allow an authenticated remote attacker to 
conduct remote code execution attacks.


Risk Rating

CVE-2018-8953 - Medium
CVE-2018-8954 - High


Platform(s)

All supported platforms


Affected Products

CVE-2018-8953:
CA Workload Automation AE r11.3.5, r11.3.6 SP6 and earlier
CVE-2018-8954:
CA Workload Control Center (CA WCC) r11.4 SP5 and earlier


Unaffected Products

CA Workload Automation AE r11.3.5 with appropriate fixes listed 
below
CA Workload Automation AE r11.3.6 SP7
CA Workload Control Center (CA WCC) r11.4 SP5 with appropriate 
fixes listed below
CA Workload Control Center (CA WCC) r11.4 SP6


How to determine if the installation is affected

Customers may use the CA Workload Automation AE / CA Workload Control 
Center interface to find the installed version and then use the table 
in the Affected Products section to determine if the installation is 
vulnerable.


Solution

CA Technologies published the following solutions to address the 
vulnerabilities.

CA Workload Automation AE r11.3.5:
Apply the appropriate patch for your platform:
Windows:  SO00700
HP:  SO00696
AIX:  SO00695
Sun:  SO00694
Linux:  SO00693

CA Workload Automation AE r11.3.6:
Apply SP7.

CA Workload Control Center (CA WCC) r11.4 SP5:
Apply patch RO99200 or CA Workload Control Center (CA WCC) r11.4 SP6


References

CVE-2018-8953 - CA Workload Automation AE SQL injection
CVE-2018-8954 - CA Workload Control Center MyFaces RCE


Acknowledgement

CVE-2018-8953 - Hamed Merati from Sense of Security Labs
CVE-2018-8954 - Hamed Merati and Kacper Nowak from Sense of 
Security Labs


Change History

Version 1.0: Initial Release


Customers who require additional information about this notice may
contact CA Technologies Support at https://support.ca.com/

If you discover a vulnerability in CA Technologies products, please
send a report to CA Technologies Product Vulnerability Response 
at vuln <AT> ca.com

Security Notices and PGP key
support.ca.com/irj/portal/anonymous/phpsbpldgpg
www.ca.com/us/support/ca-support-online/documents.aspx?id=177782


Regards,

Regards,
Ken Williams
Vulnerability Response Director
CA Technologies Product Vulnerability Response Team

Copyright (c) 2018 CA. 520 Madison Avenue, 22nd Floor, New York, NY
10022.  All other trademarks, trade names, service marks, and logos
referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 16620)
Charset: utf-8

wsFVAwUBWr2G/8Mr2sgsME5lAQoYsQ//Tt/AFWC716QPLJLhQtdwIkMuD1xjEjeM
VXnLjDxakia0czUXWKkvL44O8SINlhPqgu0PJe7soGTvq1AqSO1BlX5nTSlcz0lS
3IWj3CZQnGIx15blX6nfWAdIO8mwH7Yxc/FtG2QT3AmjuJW+C9sxAljcCv9fK2Rk
dY9om/tSmCXYwfuy/z4jpEqRXZLyOhYQ9P3+32oWSJeD4xSnifcUxbtLvm3urI9o
es14hVTL4fnX2/E33hK1ndNRuQaGuGz0oy5xLWhJ8MmkDK404tZnATRvwH5jLASY
m5JRIY61kg+G1MBIYU/F88zSw8aODyNnK3DKpcVS6fvCa46IPunVWvh7+YRRgc70
hjR+1F5MIJ+fg9qudWD0BdKQiqXJ0jHBS/N/bannUcP8FkHUdIzgUIwgxOpg7wPf
+UsmOcIzvS2zs6PNES/6XdDc1MRrmbZhM0BNZaniue7rgNhaDsSPAuXPwcJDRurv
bFfvqiA01Lt/BIgkbUjHTHbd4XiS46XLgtzxbXwlC7SgKgWViQgwMY7I/KQEIrqG
tuvjV8BwJdOVFN6UPFNvY/0FEf1C7pVcrIaxVZpWOGnZKddIvU6Dm/Arf+ezW09h
/Tc8wpW3SLh8MrEONN++VeCtUhuWAwnCqx/fA8JCGWYEfjp7WXlGMgArWNRc1WmD
tfPwcRGax7A=
=mX47
-----END PGP SIGNATURE-----

    

- 漏洞信息

CA Workload Automation AE and Workload Control Center Multiple Security Vulnerabilities
Input Validation Error 103742
Yes No
2018-03-29 12:00:00 2018-03-29 12:00:00
Hamed Merati and Kacper Nowak from Sense of Security Labs

- 受影响的程序版本

Ca Workload Control Center r11.4 SP5
Ca Workload Control Center r11.4
Ca Workload Automation AE r11.3.6 SP6
Ca Workload Automation AE r11.3.6
Ca Workload Automation AE r11.3.5
Ca Workload Automation AE r11.3.0
,Ca Workload Control Center r11.4 SP6
Ca Workload Automation AE r11.3.6 SP7

- 不受影响的程序版本

Ca Workload Control Center r11.4 SP6
Ca Workload Automation AE r11.3.6 SP7

- 漏洞讨论

CA Workload Automation AE and Workload Control Center are prone to multiple security vulnerabilities.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database or to execute arbitrary code.

The following products and versions are vulnerable:

Workload Automation AE r11.3.5, r11.3.6 SP6 and prior
Workload Control Center r11.4 SP5 and prior

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站