You are here

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks

February 5, 2013 - 12:01am

Addthis

PROBLEM:

RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks

PLATFORM:

RSA Archer SmartSuite Framework version 4.x

RSA Archer GRC version 5.x

ABSTRACT:

Several vulnerabilities were reported in RSA Archer eGRC.

REFERENCE LINKS:

Security Alert: ESA-2013-002
SecurityTracker Alert ID:  1028073
CVE-2012-1064
CVE-2012-2292
CVE-2012-2293
CVE-2012-2294

IMPACT ASSESSMENT:

Medium

DISCUSSION:

A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the site running the RSA Archer eGRC software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

IMPACT:

A remote authenticated user can exploit a relative path flaw to upload arbitrary files to the target system [CVE-2012-2293].

An insecure permission on Silverlight allows a remote user to bypass domain origin policy [CVE-2012-2292].

A remote user can conduct clickjacking attacks [CVE-2012-2294].

SOLUTION:

The vendor has issued a fix (5.2SP1, 5.3).

Addthis