CA20110426-01: Security Notice for CA Arcot WebFort Versatile Authentication Server
Issued: April 26, 2011
CA Technologies support is alerting customers to multiple security risks with CA Arcot WebFort Versatile Authentication Server. Two vulnerabilities exist that can allow a remote attacker to potentially compromise web user security.
The first set of vulnerabilities, CVE-2011-1825, occur due to insufficient handling of request parameters sent to the Arcot Administrative Console. An attacker, who can convince a user to follow a URL or view a webpage, can potentially conduct cross-site scripting attacks.
The second vulnerability, CVE-2011-1826, occurs due to insufficient filtering of a request parameter sent to the Arcot Administrative Console. An attacker, who can convince a user to follow a URL or view a webpage, can use redirection to potentially carry out additional web based attacks.
Note: These vulnerabilities only affect the Administrative Console and do not apply to end user facing pages.
Red Hat Enterprise Linux
CA Arcot WebFort Versatile Authentication Server (VAS) prior to 6.2.5
CA Arcot WebFort Versatile Authentication Server (VAS) 6.2.5
How to determine if the installation is affected
Check the CA Arcot WebFort Versatile Authentication Server log file to determine the installed release version.
- Using Windows Explorer, navigate to the following directory
- Open the file "arcotwebfortstartup.log" and search for the below string to find the version.
"STARTING Arcot WebFort"
Installations with a version prior to 6.2.5 are affected.
Upgrade to CA Arcot WebFort Versatile Authentication Server (VAS) 6.2.5.
Customers can contact email@example.com for additional support.
To reduce exposure, administrators should access the Administrative Console by bookmark and not follow any links or view any other websites prior to visiting the console.
CVE-2011-1825 - WebFort XSS
CVE-2011-1826 - WebFort Redirect
CVE-2011-1825, CVE-2011-1826 - Daniel Stirnimann, Compass Security AG
Version 1.0: Initial Release
If additional information is required, please contact CA Technologies Support at http://support.ca.com/.
If you discover a vulnerability in CA Technologies products, please report your findings to the CA Technologies Product Vulnerability Response Team.