Australia's Leading Computer Emergency Response Team

ESB-2006.0942 -- [Win][UNIX/Linux] -- CA CleverPath Portal session verification vulnerability
Date: 22 December 2006
Original URL: http://www.auscert.org.au/render.html?cid=33&it=7138

Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                    ESB-2006.0942 -- [Win][UNIX/Linux]
          CA CleverPath Portal session verification vulnerability
                             22 December 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              CA Brightstor Portal 11.1
                      CA CleverPath Aion Business Process Manager 10, 10.x
                      CA CleverPath Portal [Unix] 4.7
                      CA CleverPath Portal 4.51, 4.7, 4.71
                      CA eTrust Security Command Center - Server r8
                      CA eTrust Security Command Center 1.0
                      CA Unicenter Asset Portfolio Management r11.0
                      CA Unicenter Database Command Center r11.1
                      CA Unicenter Enterprise Job Manager 1.0 SP3
                      CA Unicenter Management Portal r11 [Linux] x86 32
                      CA Unicenter Management Portal r11 x86 32
                      CA Unicenter Workload Control Center r1 SP4 x86 32
                      Unicenter Management Portal 2.0, 3.1
Publisher:            CA
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Inappropriate Access
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-6641

Original Bulletin:    
  http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876

- --------------------------BEGIN INCLUDED TEXT--------------------


Title: CAID 34876: CA CleverPath Portal Session Inheritance
Vulnerability

CA Vulnerability ID (CAID): 34876

CA Advisory Date: 2006-12-19

Discovered By: CA customer and CA Technical Support

Impact: Remote attackers can potentially gain access to a user's 
Portal session.

Summary: CA CleverPath Portal and other CA solutions that embed 
Portal technology contain a session verification vulnerability.  
In certain multiple Portal server configurations, a user who 
connects through one Portal server could conceivably inherit the 
Portal session and associated security authentication of a user 
running on another Portal server.

Mitigating Factors: This problem only occurs when multiple Portal 
servers are sharing a common data store, and two of the Portal 
servers are started at exactly the same time. Typically, customers 
deploy multiple Portal servers in this type of configuration to 
utilize high-availability failover and load balancing. A multi 
CleverPath Portal server environment is not a default deployment, 
but it is an optional post installation configuration. None of the 
CA solutions that embed the Portal technology install into this 
scenario, or offer a multiple Portal server environment as a 
configurable option. However, it is conceivable that a 
knowledgeable administrator could have modified an embedded Portal 
environment to leverage multiple Portal servers.

Severity: CA has given this vulnerability a Low risk rating.

Affected Products:
CleverPath Portal r4.51
CleverPath Portal r4.7
CleverPath Portal r4.71
BrightStor Portal r11.1
CleverPath Aion BPM r10
CleverPath Aion BPM r10.1
CleverPath Aion BPM r10.2
eTrust Security Command Center r1
eTrust Security Command Center r8
Unicenter Asset and Portfolio Management r11
Unicenter Database Management Portal r11
Unicenter Database Command Center r11.1
Unicenter Enterprise Job Manager r1 SP3
Unicenter Workload Control Center r1 SP4
Unicenter Management Portal r2.0
Unicenter Management Portal r3.1
Unicenter Management Portal r11.0

Affected platforms:
All supported operating systems (Windows, Linux, and supported 
UNIX platforms).

Status and Recommendation: 
The most prudent course of action for affected customers is to 
download and apply the corrective maintenance. If the maintenance 
cannot be applied right away, CA Technical Support recommends 
implementing interim operational process controls to ensure, when 
multiple Portal servers are sharing a common data store, that the 
server start times are duly staggered by at least one minute.

Determining if you are affected: 
Affected Portal installations must meet both of the following 
criteria:
1) You are not at Portal maintenance version 4.71.001_179_060830 
   or higher. To determine your portal version:
   a. Login as a Portal Administrator.
   b. Choose "My Profile" from the upper right-hand portion of the 
      main workplace.
   c. Click on the "Portal Administration" link.
   d. The Portal version will be displayed in the right-hand pane 
      under Statistics.
2) You are running CA's Portal technology in a multi-server 
   environment. To determine if you are running a multi-server 
   environment:
   a. Login as a Portal Administrator.
   b. Choose "My Profile" from the upper right-hand portion of the 
      main workplace.
   c. Click on the "Portal Administration" link.
   d. If the "Jump to Portal" menu appears in the left Portal 
      Administration pane, you are using a multiple-server 
      environment. If you do not see the "Jump to Portal" section, 
      then Portal is not running in a multi-server environment and 
      is not affected by this vulnerability.
Note: refer to the SupportConnect Security Notice for additional 
information.

References (URLs may wrap): 
CA SupportConnect:
http://supportconnect.ca.com/
CA SupportConnect security notice for this vulnerability:
Important Security Notice for CA CleverPath and Embedded Portal
Customers
http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp
Solution Document Reference APARs: 
Refer to the SupportConnect Security Notice.
CA Security Advisor posting:
CA CleverPath Portal Session Inheritance Vulnerability
http://www3.ca.com/securityadvisor/newsinfo/
CAID: 34876
CAID Advisory link: 
http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876
CVE Reference: CVE-2006-6641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6641
OSVDB Reference: OSVDB-30854
http://osvdb.org/30854

Changelog for this advisory:
v1.0 - Initial Release

Customers who require additional information should contact CA 
Technical Support at http://supportconnect.ca.com.

For technical questions or comments related to this advisory,
please send email to vuln@ca.com, or contact me directly.

If you discover a vulnerability in CA products, please report
your findings to vuln@ca.com, or utilize our "Submit a 
Vulnerability" form.
URL: http://www3.ca.com/securityadvisor/vulninfo/submit.aspx


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, One CA Plaza. Islandia, NY 11749
	
Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright © 2006 CA. All rights reserved.


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRYsU2yh9+71yA2DNAQI8UwP/bHollk8HiJpMz5rZ7izEw0U7ODmBeS+n
BAEDFebboBDx8ENfwrR6WOfcL+GBV867sn5JxEzy+RKMCescshM+Ky19P5ixLb9x
zlJAu4CN/aatFYvhmXtkeohnXUMrfjJAUx1YWfim4TJtuU/PsnWF87ZfrwDV0sYc
J2PbHrzygbw=
=Ursk
-----END PGP SIGNATURE-----