Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
References
Link | Resource |
---|---|
http://secunia.com/advisories/22023 | Exploit Patch Vendor Advisory |
http://securitytracker.com/id?1016910 | |
http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt | Exploit Patch Vendor Advisory |
http://www.osvdb.org/29010 | Exploit Patch |
http://www.securityfocus.com/archive/1/446611/100/0/threaded | |
http://www.securityfocus.com/archive/1/446716/100/0/threaded | |
http://www.securityfocus.com/bid/20139 | |
http://www.vupen.com/english/advisories/2006/3738 | |
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9 | Exploit Patch Vendor Advisory |
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29104 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-09-22T22:00:00
Updated: 2018-10-17T20:57:01
Reserved: 2006-09-20T00:00:00
Link: CVE-2006-4900
JSON object: View
NVD Information
Status : Modified
Published: 2006-09-22T22:07:00.000
Modified: 2021-04-09T16:21:30.627
Link: CVE-2006-4900
JSON object: View
Redhat Information
No data.
CWE