Lucene search

K
zdiAndrea Micalizzi aka rgodZDI-14-094
HistoryApr 17, 2014 - 12:00 a.m.

CA ERwin Web Portal MIMM downloadScriptFile.do Information Disclosure Vulnerability

2014-04-1700:00:00
Andrea Micalizzi aka rgod
www.zerodayinitiative.com
10

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.928 High

EPSS

Percentile

99.0%

This vulnerability allows remote attackers to read nearly any system file, including database credentials, on a system with vulnerable installations of CA ERwin Web Portal’s Meta Integration Metadata Management service. Authentication is not required to exploit this vulnerability. The specific flaw exists within the “Meta Integration Web Server and Services” struts-controller servlet, part of a Struts application, which is vulnerable to a directory traversal. An attacker can leverage this vulnerability to read arbitrary files, including files which store database credentials, under the context of SYSTEM. An attacker can couple this vulnerability with others to gain remote code execution.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.928 High

EPSS

Percentile

99.0%