Directory traversal vulnerability in the Heartbeat Web Service in CA.Itm.Server.ManagementWS.dll in the Management Server in CA Total Defense (TD) r12 before SE2 allows remote attackers to execute arbitrary code via directory traversal sequences in the GUID parameter in an upload request to FileUploadHandler.ashx.
secunia.com/advisories/44097
securitytracker.com/id?1025353
www.securityfocus.com/archive/1/517488/100/0/threaded
www.securityfocus.com/archive/1/517494/100/0/threaded
www.securityfocus.com/bid/47357
www.vupen.com/english/advisories/2011/0977
www.zerodayinitiative.com/advisories/ZDI-11-126/
exchange.xforce.ibmcloud.com/vulnerabilities/66726
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D