-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

CA20180829-01: Security Notice for CA PPM

Issued: August 29, 2018
Last Updated: August 29, 2018

CA Technologies Support is alerting customers to multiple potential 
risks with CA PPM (formerly CA Clarity PPM). Multiple vulnerabilities 
exist that can allow an attacker to conduct a variety of attacks.  

The first vulnerability, CVE-2018-13822, has a medium risk rating and 
concerns an SSL password being stored in plain text, which can allow 
an attacker to access sensitive information.

The second vulnerability, CVE-2018-13823, has a high risk rating and 
concerns an XML external entity vulnerability in the XOG functionality, 
which can allow a remote attacker to access sensitive information.

The third vulnerability, CVE-2018-13824, has a high risk rating and 
concerns two parameters that fail to properly sanitize input, which 
can allow a remote attacker to execute SQL injection attacks.

The fourth vulnerability, CVE-2018-13825, has a high risk rating and 
concerns improper input validation by the gridExcelExport 
functionality, which can allow a remote attacker to execute reflected 
cross-site scripting attacks.

The fifth vulnerability, CVE-2018-13826, has a medium risk rating and 
concerns an XML external entity vulnerability in the XOG functionality, 
which can allow a remote attacker to conduct server side request 
forgery attacks.


Risk Rating

Cumulative risk rating:  High


Platform(s)

All supported platforms


Affected Products

CA PPM 14.3 and below
CA PPM 14.4
CA PPM 15.1
CA PPM 15.2
CA PPM 15.3


Unaffected Products

CA PPM 15.2 with appropriate patch level listed in Solution section 
of this document.
CA PPM 15.3 with appropriate patch level listed in Solution section 
of this document.
CA PPM 15.4
CA PPM 15.4.1


How to determine if the installation is affected

Customers can use the CA PPM Classic interface to find the release and 
patch level by clicking on "About" in the upper right corner of any 
screen.


Solution

CA Technologies published the following solutions to address the 
vulnerabilities. 

CA PPM 15.3: 
Apply 15.3.Cumulative Patch 3 (15.3.0.3) or later.

CA PPM 15.2: 
Apply 15.2 Cumulative Patch 6 (15.2.0.6) or later.

CA PPM 15.1:
Please contact CA Technologies Support for assistance.  Note that 
CA PPM 15.1 will reach End of Service (EOS) on April 30, 2019.

CA PPM 14.4:
Please contact CA Technologies Support for assistance.  Note that 
CA PPM 14.4 will reach End of Service (EOS) on October 31, 2018.

CA PPM 14.3 and below:
As you plan your upgrade to the latest release, please feel free to 
contact CA Technologies Support should you have any questions.


References

CVE-2018-13822 - CA PPM unencrypted SSL password
CVE-2018-13823 - CA PPM XXE in XOG info disclosure
CVE-2018-13824 - CA PPM SQL injection
CVE-2018-13825 - CA PPM gridExcelExport Reflected XSS
CVE-2018-13826 - CA PPM XXE in XOG SSRF


Acknowledgement

CVE-2018-13822 - Piotr Domirski
CVE-2018-13823 - Piotr Domirski
CVE-2018-13824 - Piotr Domirski
CVE-2018-13825 - Piotr Domirski
CVE-2018-13826 - Piotr Domirski


Change History

Version 1.0: 2018-08-29 - Initial Release


Customers who require additional information about this notice may
contact CA Technologies Support at https://support.ca.com/

To report a suspected vulnerability in a CA Technologies product,
please send a summary to CA Technologies Product Vulnerability
Response at vuln <AT> ca.com

Security Notices and PGP key
support.ca.com/irj/portal/anonymous/phpsbpldgpg
www.ca.com/us/support/ca-support-online/documents.aspx?id=177782

Regards,
Ken Williams
Vulnerability Response Director, Product Vulnerability Response Team
CA Technologies | 520 Madison Avenue, 22nd Floor, New York NY 10022


Copyright (c) 2018 CA. 520 Madison Avenue, 22nd Floor, New York, NY
10022.  All other trademarks, trade names, service marks, and logos
referenced herein belong to their respective companies.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15238)
Charset: utf-8

wsFVAwUBW4llorlJjor7ahBNAQh0XxAAgxdkwPjBI22xUdXwFHcVWec/qQWX/25B
h/MNN8HdlwKL3IV0MCnncHFaHkoGbQAhtyo5wyY9ql2GCBKUiLYNtDdXrBg1AlTw
MrgJnW0FkxiDvt90mIuWITkCF52sBVvoCCHfFvH781Z1PYlmThmcrf4Pc3kXunIs
a/pD9JMnBKBQEYUmdSHddqZ58pia+mYGlJY0b9fcNkYzqaMYx2QFh7TFeSq0wf1D
tZPQ7XOu69hOA2pE6/9XHqN5DyRk4rEXaTLHMNN+i9DXB1+aXdLNBAlnuSWi3hVU
oHtz8VULoVNrYZygcMOnQz9HusJcH8XaIv8hurqObzH5n3RsrGlvDM/9SxYaVE/j
m8x2yuiOBFQLO2elCnr2xEe9Qsrmkak8c8Ddkuc9e9mxas5ss1wdE/j5rpOzYIwG
QzJD+7nznBvAR8NG/jSVFMYu/M6zDmseKE0tPYHy8oDAV8VOhuoOJ05OoXWVnuc3
BXFfrWxdb6+C831QUs5HEuPfdETJPsUmZE4cGjeesVmInX7X729rtXDX/IIYQBli
3K+TFtxyMCmhAaNgRWt4Kgfv2v+WSEvVV1S9ivowrrDb+5KxnKqx2ib/+ZVJ2jhP
jj8p6bOKSlFqpU8mR767oNwslsIO4bBDvFsT4UO4bwSmxiwbSjwbHkIuAdXG0dCL
MRY2J0rRxzQ=
=TW4m
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Reply via email to