what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA Service Desk Manager Cross Site Scripting

CA Service Desk Manager Cross Site Scripting
Posted Jul 26, 2013
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to a potential risk with CA Service Desk Manager. A vulnerability exists that can allow a remote attacker to conduct cross-site scripting attacks. CA Technologies published patches to address the vulnerability. The vulnerability occurs due to insufficient verification of URL query string parameters. An attacker, who can have an unsuspecting user follow a carefully constructed URL, may perform various cross-site scripting attacks.

tags | advisory, remote, xss
advisories | CVE-2013-2630
SHA-256 | d63a76083ac68c48ee8a7b1f88abdecf4446e7f484d0f8db4a371147e75caf8c

CA Service Desk Manager Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

CA20130725-01: Security Notice for CA Service Desk Manager

Issued: July 25, 2013

CA Technologies Support is alerting customers to a potential risk
with CA Service Desk Manager. A vulnerability exists that can allow a
remote attacker to conduct cross-site scripting attacks. CA
Technologies published patches to address the vulnerability.

The vulnerability, CVE-2013-2630, occurs due to insufficient
verification of URL query string parameters. An attacker, who can
have an unsuspecting user follow a carefully constructed URL, may
perform various cross-site scripting attacks.

Risk Rating

Medium

Platform

Windows, Sun, AIX, Linux

Affected Products

CA Service Desk Manager 12.5
CA Service Desk Manager 12.6
CA Service Desk Manager 12.7

How to determine if the installation is affected

Steps to identify the Service Desk Manager version and if the
relevant patch is installed:

1. Navigate to the $NX_ROOT directory on the Service Desk server.

Note: NX_ROOT points to the Service Desk Manager installation
directory which by default is
"C:\Program Files\CA\Service Desk Manager" for Windows or
"/opt/CAisd/" for Sun Solaris, AIX, and Linux.

2. Identify the Service Desk Manager application version using
the following steps:

a. Navigate to the "$NX_ROOT\pdmconf\" directory for Windows or
"$NX_ROOT/pdmconf/" for Sun Solaris, AIX, and Linux.
b. Locate the file with the name "version" and open it with a text
editor.
c. The version of Service Desk Manager can be noted from the file
(Example: Version r12.6).

3. Locate the file <machine_name>.his under $NX_ROOT directory.

Note: The file may not exist if the Service Desk Manager server is
unpatched.

4. Open the file with a text editor and locate the patch based on the
matrix below for the corresponding Service Desk Manager version
and operating system:

R12.5:
WINDOWS: RO59355
LINUX: RO59356
SUN: RO61158
AIX: RO61159

R12.6:
WINDOWS: RO59358
LINUX: RO59359
SUN: RO59360
AIX: RO59362

R12.7:
WINDOWS: RO59560
LINUX: RO59365
SUN: RO59366
AIX: RO59367

An example entry found in the history file:

[DATE] - PTF Wizard installed RO59355 (USRD) RELEASE=12.7

5. If the corresponding patch is not installed, then the installation
might be vulnerable.

Solution

CA Technologies published the following patches to address the
vulnerabilities.

CA Service Desk Manager 12.5 Windows:
RO59355

CA Service Desk Manager 12.5 Sun:
RO61158

CA Service Desk Manager 12.5 AIX:
RO61159

CA Service Desk Manager 12.5 Linux:
RO59356

CA Service Desk Manager 12.6 Windows:
RO59358

CA Service Desk Manager 12.6 Sun:
RO59360

CA Service Desk Manager 12.6 AIX:
RO59362

CA Service Desk Manager 12.6 Linux:
RO59359

CA Service Desk Manager 12.7 Windows:
RO59560

CA Service Desk Manager 12.7 Sun:
RO59366

CA Service Desk Manager 12.7 AIX:
RO59367

CA Service Desk Manager 12.7 Linux:
RO59365

CA20130725-01: Security Notice for CA Service Desk Manager
https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

References

CVE-2013-2630

Acknowledgement

CVE-2013-2630 - Puneeth Kumar R

Change History

Version 1.0: Initial Release

If additional information is required, please contact CA Technologies
Support at http://support.ca.com/

If you discover a vulnerability in CA Technologies products, please
report your findings to the CA Technologies Product Vulnerability
Response Team:
https://support.ca.com/irj/portal/anonymous/phpsbpldgpg

Regards,

Kevin Kotas
Director, CA Technologies Product Vulnerability Response Team

Copyright (c) 2013 CA. All Rights Reserved. One CA Plaza, Islandia,
N.Y. 11749. All other trademarks, trade names, service marks, and
logos referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Charset: utf-8

wsBVAwUBUfGmaZI1FvIeMomJAQEIJwf/dJHMhnStmOckkTcQSBZt/Txhy+kIF51/
v7yeeSmCsNpaCtxLg6noxDSPRa3hB4owRNL2qU9Bfst8FVvpX1CyF7El+S3XqgHg
thYFmlWbvmJr30G7saw6fsLRsQpjG1m4zAb518Csy2L1+MnoH1discqvzmlH5kkD
VfhuPBuTpuhbMiwBwbmojm5nXQoBssZIKTneYYn3TUf0MvRH4KtopPgAqcB/BxmY
x7tc9pD2tJpyjJQ/WFAOZMxoaaP9oBXlbf8b2Plqh2lkmxtZTD8KppngwMXhce6s
kqTuHuUk1IMLPhXDeIgXQHN6HaQKshGqYBUJEv18oKDYY5ZlD3Scsg==
=KV9p
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close