SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CA Service Desk Vendors:   CA
(CA Issues Fix for CA Service Desk) Tomcat Input Validation Hole in Host Manager Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1023642
SecurityTracker URL:  http://securitytracker.com/id/1023642
CVE Reference:   CVE-2008-1947   (Links to External Site)
Date:  Feb 23 2010
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 12.1
Description:   A vulnerability was reported in Tomcat in the Host Manager application. A remote user can conduct cross-site scripting attacks. CA Service Desk is affected.

The Host Manager web application does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Tomcat software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Tomcat software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   CA has issued a fix for CA Service Desk.

The CA advisory is available at:

https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=229526

Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 4 2008 Tomcat Input Validation Hole in Host Manager Permits Cross-Site Scripting Attacks



 Source Message Contents

Subject:  CA20100222-01: Security Notice for CA Service Desk

-----BEGIN PGP SIGNED MESSAGE-----

CA20100222-01: Security Notice for CA Service Desk

Issued: February 22, 2010

CA's support is alerting customers to a security risk with CA Service
Desk r12.1. The release of Tomcat as included with CA Service Desk
r12.1 is potentially susceptible to a cross-site scripting
vulnerability. CA has issued a technical document that describes
remediation procedures.

Risk Rating

Medium

Platforms

Windows
Unix

Affected Products

CA Service Desk r12.1

How to determine if the installation is affected

Customers can use the instructions in technical document TEC503137 to
determine if an installation may be affected.

Solution

Follow the instructions in technical document TEC503137.
(line may wrap)
https://support.ca.com/irj/portal/anonymous/redirArticles?reqPage=sear
ch&searchID=TEC503137

References

CVE-2008-1947

Change History

Version 1.0: Initial Release

If additional information is required, please contact CA Support at
http://support.ca.com/

If you discover a vulnerability in CA products, please report your
findings to the CA Product Vulnerability Response Team.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBS4MO/JI1FvIeMomJAQEJ0AgAtPTeURZRFLbsh94ttXzoTQpkYwXEoFls
SKOYsYZDNXTtlC0x2ZTTRlA0MKMXvCuFPJVFDzhwMs1mkJnL6lf+EkArK1R1B3vW
5IBysmAjrFQN6KONMlD9KMWJeGaaJlCwcA664OUE/tNFhXp+blSet6fKwKU6eHkC
vuhO2RT1+DhkNTRs4QN+aOfjqLrkmA8DnGjQeTA2FLu/l3YroBQHwwlKuXpHNzZ6
RHERx7T0jDzzgtpWRjX6sHTiEW852Ds8ozLSygQJYUByWQBdXbxgsBFpiYi5a66+
D4UcBwdiXiWvYTAbyffs6ViYj/PosWpxirQL1lahfr1K5Mkp/tIpLA==
=t2FJ
-----END PGP SIGNATURE-----
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC