lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 28 Jun 2018 16:05:05 +0000
From: Dell EMC Product Security Response Center <>
To: "''" <>
Subject: [FD] DSA-2018-122: RSA Certificate Manager Path Traversal

Hash: SHA256

DSA-2018-122: RSA Certificate Manager Path Traversal Vulnerability

Dell EMC Identifier: DSA-2018-122

CVE Identifier: CVE-2018-11051

Severity: High

Severity Rating: CVSS v3 Base Score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products:

RSA Certificate Manager Versions 6.9 build 560 through 6.9 build 564


RSA Certificate Manager 6.9 contains a fix for a path traversal vulnerability that could potentially be exploited by malicious users to compromise the affected system.


RSA Certificate Manager Versions 6.9 build 560 through 6.9 build 564 contain a path traversal vulnerability in the RSA CMP Enroll Server and the RSA REST Enroll Server. A remote unauthenticated attacker could potentially exploit this vulnerability by manipulating input parameters of the application to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application.

For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at   To search for a particular CVE, use the database's search utility at

The following product versions contain resolutions to these issues:
*             RSA Certificate Manager version 6.9 build 565 or later

RSA recommends all customers upgrade at the earliest opportunity. Customers should follow security best practices to password protect CA and SSL keys, and to encrypt passwords in RSA Certificate Manager configuration files using ppencryption tool.

Severity Rating:

For an explanation of Severity Ratings, refer to the Knowledge Base Article, "Security Advisories Severity Rating" at RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.



Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ