CVE-2006-4900
CA eTrust Security Command Center < SP1 CR2 - Path Traversal
Title source: llmDescription
Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via ".." sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Patrick Webster · textremotewindows
https://www.exploit-db.com/exploits/28641
References (11)
Core 11
Core References
Exploit, Patch, Vendor Advisory x_refsource_misc
http://users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt
Exploit, Patch, Vendor Advisory x_refsource_confirm
http://www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1016910
Patch, Vendor Advisory x_refsource_confirm
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22023
Exploit, Patch vdb-entry
x_refsource_osvdb
http://www.osvdb.org/29010
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29104
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20139
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446716/100/0/threaded
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446611/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3738
Scores
EPSS
0.1056
EPSS Percentile
93.3%
Details
Status
published
Products (1)
broadcom/etrust_security_command_center
8 (3 CPE variants)
Published
Sep 22, 2006
Tracked Since
Feb 18, 2026