Secunia Security Advisory - A vulnerability has been reported in CA Unicenter Web Services Distributed Management (WSDM), which can be exploited by malicious people to disclose sensitive information.
3c7d35faee9e51410a47fb6c9e470bf2ee421e9902e9d13b80b185f6ec50f2d4
----------------------------------------------------------------------
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts.
We will help with relocation and obtaining a work permit.
Currently the following type of positions are available:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
----------------------------------------------------------------------
TITLE:
CA Unicenter Web Service Distributed Management Directory Traversal
SECUNIA ADVISORY ID:
SA22229
VERIFY ADVISORY:
http://secunia.com/advisories/22229/
CRITICAL:
Moderately critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
CA Unicenter Web Services Distributed Management 3.x
http://secunia.com/product/12199/
DESCRIPTION:
A vulnerability has been reported in CA Unicenter Web Services
Distributed Management (WSDM), which can be exploited by malicious
people to disclose sensitive information.
The vulnerability is caused due to an error within the included Jetty
WebServer, which does not correctly check path names in HTTP requests.
This can be exploited to access arbitrary files on a vulnerable system
via directory traversal attacks.
The vulnerability has been reported in versions prior to version
3.11. Other versions may also be affected.
Note: This vulnerability may be related to:
SA7178
SOLUTION:
Update to WSDM 3.11 or later.
PROVIDED AND/OR DISCOVERED BY:
Oliver Karow and Richard Sammet, Symantec
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049846.html
OTHER REFERENCES:
SA7178:
http://secunia.com/advisories/7178/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------