[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BYAPR01MB39106D27811BF39746F599B5F1A10@BYAPR01MB3910.prod.exchangelabs.com>
Date: Fri, 30 Mar 2018 00:54:52 +0000
From: "Williams, Ken" <Ken.Williams@...com>
To: "'fulldisclosure@...lists.org'" <fulldisclosure@...lists.org>
Subject: [FD] CA20180329-01: Security Notice for CA Workload Automation AE
and CA Workload Control Center
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
CA20180329-01: Security Notice for CA Workload Automation AE and CA
Workload Control Center
Issued: March 29, 2018
Last Updated: March 29, 2018
CA Technologies Support is alerting customers to two potential risks
with CA Workload Automation AE and CA Workload Control Center. Two
vulnerabilities exist that can allow a remote attacker to conduct SQL
injection attacks or execute code remotely.
The first vulnerability, CVE-2018-8953, in CA Workload Automation AE,
has a medium risk rating and concerns insufficient data validation
that can allow an authenticated remote attacker to conduct SQL
injection attacks.
The second vulnerability, CVE-2018-8954, in CA Workload Control
Center, has a high risk rating and concerns an Apache MyFaces
configuration that can allow an authenticated remote attacker to
conduct remote code execution attacks.
Risk Rating
CVE-2018-8953 - Medium
CVE-2018-8954 - High
Platform(s)
All supported platforms
Affected Products
CVE-2018-8953:
CA Workload Automation AE r11.3.5, r11.3.6 SP6 and earlier
CVE-2018-8954:
CA Workload Control Center (CA WCC) r11.4 SP5 and earlier
Unaffected Products
CA Workload Automation AE r11.3.5 with appropriate fixes listed
below
CA Workload Automation AE r11.3.6 SP7
CA Workload Control Center (CA WCC) r11.4 SP5 with appropriate
fixes listed below
CA Workload Control Center (CA WCC) r11.4 SP6
How to determine if the installation is affected
Customers may use the CA Workload Automation AE / CA Workload Control
Center interface to find the installed version and then use the table
in the Affected Products section to determine if the installation is
vulnerable.
Solution
CA Technologies published the following solutions to address the
vulnerabilities.
CA Workload Automation AE r11.3.5:
Apply the appropriate patch for your platform:
Windows: SO00700
HP: SO00696
AIX: SO00695
Sun: SO00694
Linux: SO00693
CA Workload Automation AE r11.3.6:
Apply SP7.
CA Workload Control Center (CA WCC) r11.4 SP5:
Apply patch RO99200 or CA Workload Control Center (CA WCC) r11.4 SP6
References
CVE-2018-8953 - CA Workload Automation AE SQL injection
CVE-2018-8954 - CA Workload Control Center MyFaces RCE
Acknowledgement
CVE-2018-8953 - Hamed Merati from Sense of Security Labs
CVE-2018-8954 - Hamed Merati and Kacper Nowak from Sense of
Security Labs
Change History
Version 1.0: Initial Release
Customers who require additional information about this notice may
contact CA Technologies Support at https://support.ca.com/
If you discover a vulnerability in CA Technologies products, please
send a report to CA Technologies Product Vulnerability Response
at vuln <AT> ca.com
Security Notices and PGP key
support.ca.com/irj/portal/anonymous/phpsbpldgpg
www.ca.com/us/support/ca-support-online/documents.aspx?id=177782
Regards,
Regards,
Ken Williams
Vulnerability Response Director
CA Technologies Product Vulnerability Response Team
Copyright (c) 2018 CA. 520 Madison Avenue, 22nd Floor, New York, NY
10022. All other trademarks, trade names, service marks, and logos
referenced herein belong to their respective companies.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 16620)
Charset: utf-8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=mX47
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists