First published: Fri Sep 22 2006(Updated: )
The ePPIServlet script in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, when running on Windows, allows remote attackers to obtain the web server path via a "'" (single quote) in the PIProfile function, which leaks the path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
eTrust Security Command Center | =1.0 | |
eTrust Security Command Center | =8 | |
eTrust Security Command Center | =8-sp1 | |
eTrust Security Command Center | =8-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4899 is considered a medium severity vulnerability due to its potential for information disclosure.
To fix CVE-2006-4899, you should upgrade to the latest version of CA eTrust Security Command Center, specifically to versions beyond 8.1 SP1 CR2.
CVE-2006-4899 affects systems running CA eTrust Security Command Center versions 1.0 and 8.0 up to SP1 CR2 on Windows.
The main consequence of exploiting CVE-2006-4899 is the potential exposure of the web server path through error messages.
Yes, CVE-2006-4899 can be exploited remotely by attackers who send a specially crafted request containing a single quote.