what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA eHealth Cross Site Scripting

CA eHealth Cross Site Scripting
Posted May 11, 2011
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies support is alerting customers to a security risk with CA eHealth. A vulnerability exists that may potentially allow an attacker to compromise web user security. The vulnerability occurs due to insufficient validation of sent request parameters. An attacker, who can convince a user to follow a carefully constructed link or view a malicious web page, can conduct various cross-site scripting attacks. Versions 6.0.x, 6.1.x, 6.2.1, and 6.2.2 are affected.

tags | advisory, web, xss
advisories | CVE-2011-1899
SHA-256 | 59491a8e54f0e3980dff181e854aac91f5f99b5bc0eb81ce1a280219f8dbd3da

CA eHealth Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

CA20110510-01: Security Notice for CA eHealth

Issued: May 10, 2011

CA Technologies support is alerting customers to a security risk with
CA eHealth. A vulnerability exists that may potentially allow an
attacker to compromise web user security.

The vulnerability, CVE-2011-1899, occurs due to insufficient
validation of sent request parameters. An attacker, who can convince
a user to follow a carefully constructed link or view a malicious
web page, can conduct various cross-site scripting attacks.

Note: The "Scan user input for potentially malicious HTML content"
configuration option does not protect against this vulnerability.

Risk Rating

Medium

Platform

Windows
Unix

Affected Products

CA eHealth 6.0.x
CA eHealth 6.1.x
CA eHealth 6.2.1
CA eHealth 6.2.2

How to determine if the installation is affected

Locate the following file on the respective platform:

Platform
File path

Windows
"%NH_HOME%\extensions\local\42339.log"

Unix
"$NH_HOME/extensions/local/42339.log"

If the file is not present, the installation is vulnerable.

Solution

Customers may contact CA Technologies support to obtain a patch that
resolves this issue. Request the patch for PRD 42339 when submitting
the support ticket.

References

CVE-2011-1899 - eHealth cross-site scripting

CA20110510-01: Security Notice for CA eHealth
(line wraps)
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={5
662845D-4CD7-4CE6-8829-4F07A4C67366}

Acknowledgement

CVE-2011-1899 - Tony Fogarty

Change History

Version 1.0: Initial Release
If additional information is required, please contact CA Support at
http://support.ca.com/

If you discover a vulnerability in CA products, please report your
findings to the CA Product Vulnerability Response Team.
(line wraps)
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=17
7782

Regards,

Kevin Kotas
CA Technologies Product Vulnerability Response Team

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBTcnDXJI1FvIeMomJAQG7OAf/VxiNXwFJPWZbqwhyVQRCN33g3+fPWGSe
6vNpiGMaZAZ9IBLbTRxI8B0XRsmcHclPFurc7SzH8zO37GktJ2RnJZ0MuZWGVQsD
dVspm/r3DxHtWyLbRGxV9FpRRErqG6OHuTPDZ69dbaODvD2p8DXzjKBC4w3vBtPi
h13x1sO6sUapQ40gYL8Z4bq8uDf+BP0iENI2VArSdalUwTdtWsD6dwmiDb45iHpX
a8HHNCVQ1YJFHhydNVnm0vhBOe58tOLC7K92Yyrk6Gn801UD/jCcg+dc5FoAibgo
LmasWeVzcPmR7ZGYiogG0abUlYZEG6KiQxyuvfk/0xthEYM6mt1fZw==
=SGmt
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close