2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-4899" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-09-22T22:07:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The ePPIServlet script in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, when running on Windows, allows remote attackers to obtain the web server path via a \"'\" (single quote) in the PIProfile function, which leaks the path in an error message."
} ,
{
"lang" : "es" ,
"value" : "La secuencia de comandos ePPIServlet en ssociates (CA) eTrust Security Command Center 1.0 y r8 hasta SP1 CR2, cuando funciona sobre Windows, permite a un atacante remoto obtener la ruta del servidor web a trav\u00e9s de \"'\" (comilla simple) en la funci\u00f3n PIProfile, lo cual filtra la ruta en un mensaje de error."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 03:16:05 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 03:16:05 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_security_command_center:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C363D8B-1022-4C2A-BEDE-34EAB274D9D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB8C8321-1BE6-476D-910E-6BBDBE683309"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*" ,
"matchCriteriaId" : "054689EB-D43E-4C0F-B504-FE615607332A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*" ,
"matchCriteriaId" : "40DC453F-12F6-4D51-ADFF-71D2628F3CD8"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/22023" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1016910" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/29009" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/446611/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/446716/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/20139" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3738" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34616" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29102" ,
"source" : "cve@mitre.org"
2024-11-22 03:16:05 +00:00
} ,
{
"url" : "http://secunia.com/advisories/22023" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1016910" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.osvdb.org/29009" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/446611/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/446716/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/20139" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3738" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34616" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29102" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}