First published: Wed Feb 06 2013(Updated: )
The Silverlight cross-domain policy in EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 does not restrict access to the Archer application, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Archer | =4.3 | |
EMC RSA Archer | =4.5 | |
EMC RSA Archer | =5.0 | |
EMC RSA Archer | =5.1 | |
EMC RSA Archer | =5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2292 is classified as a medium-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2012-2292, upgrade to RSA Archer SmartSuite Framework 4.5 or later, or RSA Archer GRC 5.2SP1 or later.
The potential impacts of CVE-2012-2292 include unauthorized access to sensitive application data and bypassing of security policies.
CVE-2012-2292 affects EMC RSA Archer SmartSuite 4.x and RSA Archer GRC 5.x versions prior to 5.2SP1.
CVE-2012-2292 can be exploited by remote attackers who can send requests that bypass the Same Origin Policy.