First published: Thu Aug 30 2018(Updated: )
An XML external entity vulnerability in the XOG functionality, in CA PPM 14.3 and below, 14.4, 15.1, 15.2 CP5 and below, and 15.3 CP2 and below, allows remote attackers to conduct server side request forgery attacks.
Credit: vuln@ca.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Project Portfolio Management | <=14.3 | |
Broadcom Project Portfolio Management | =14.4 | |
Broadcom Project Portfolio Management | =15.1 | |
Micro Focus Project and Portfolio Management | =15.2-cp5 | |
Micro Focus Project and Portfolio Management | =15.3-cp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13826 is classified as a medium severity vulnerability due to its potential to exploit XML external entity attacks.
To fix CVE-2018-13826, upgrade your CA Project Portfolio Management software to versions above 14.3, 14.4, 15.1, 15.2 CP5, or 15.3 CP2.
The impact of CVE-2018-13826 allows remote attackers to conduct server-side request forgery attacks, which may lead to sensitive data exposure.
CVE-2018-13826 affects CA PPM versions 14.3 and below, 14.4, 15.1, and 15.2 CP5 and below, and 15.3 CP2 and below.
There are no specific workarounds mentioned for CVE-2018-13826, thus upgrading to a non-vulnerable version is recommended.