Insufficient output sanitization in the Automic Web Interface (AWI), in CA Automic Workload Automation 12.0 to 12.2, allow attackers to potentially conduct persistent cross site scripting (XSS) attacks via a crafted object.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106755 | Third Party Advisory VDB Entry |
https://communities.ca.com/community/product-vulnerability-response/blog/2019/01/24/ca20190124-01-security-notice-for-ca-automic-workload-automation | Vendor Advisory |
https://marc.info/?l=bugtraq&m=154874504200510&w=2 | Mailing List Third Party Advisory |
https://packetstormsecurity.com/files/151325/CA-Automic-Workload-Automation-12.x-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
https://sec-consult.com/en/blog/advisories/cross-site-scripting-in-ca-automic-workload-automation-web-interface-formerly-automic-automation-engine/ | Third Party Advisory |
https://seclists.org/fulldisclosure/2019/Jan/61 | Mailing List Third Party Advisory |
https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190124-01-security-notice-for-ca-automic-workload-automation.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: ca
Published: 2019-01-24T00:00:00
Updated: 2019-02-06T10:57:02
Reserved: 2019-01-22T00:00:00
Link: CVE-2019-6504
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-02-06T00:29:00.247
Modified: 2021-04-07T18:13:08.863
Link: CVE-2019-6504
JSON object: View
Redhat Information
No data.
CWE