Vulnerability Details : CVE-2011-1653
Public exploit exists!
Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures.
Vulnerability category: Sql Injection
Products affected by CVE-2011-1653
- cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1653
97.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2011-1653
-
CA Total Defense Suite reGenerateReports Stored Procedure SQL Injection
Disclosure Date: 2011-04-13First seen: 2020-04-26exploit/windows/http/ca_totaldefense_regeneratereportsThis module exploits a SQL injection flaw in CA Total Defense Suite R12. When supplying a specially crafted soap request to '/UNCWS/Management.asmx', an attacker can abuse the reGenerateReports stored procedure by injecting arbitrary sql statements into the ReportI
CVSS scores for CVE-2011-1653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2011-1653
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1653
-
http://www.securityfocus.com/archive/1/517493/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/archive/1/517497/100/0/threaded
SecurityFocus
-
http://www.zerodayinitiative.com/advisories/ZDI-11-133/
ZDI-11-133 | Zero Day Initiative
-
http://www.securityfocus.com/bid/47355
Computer Associates Total Defense Multiple SQL Injection Vulnerabilities
-
http://www.securityfocus.com/archive/1/517494/100/0/threaded
SecurityFocus
-
http://securitytracker.com/id?1025353
CA Total Defense Input Validation Flaw Lets Remote Users Inject SQL Commands - SecurityTracker
-
http://www.zerodayinitiative.com/advisories/ZDI-11-132/
ZDI-11-132 | Zero Day Initiative
-
http://www.zerodayinitiative.com/advisories/ZDI-11-130/
ZDI-11-130 | Zero Day Initiative
-
http://www.vupen.com/english/advisories/2011/0977
Webmail | OVH- OVHVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-11-131/
ZDI-11-131 | Zero Day Initiative
-
http://www.securityfocus.com/archive/1/517496/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/archive/1/517498/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/archive/1/517490/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/archive/1/517489/100/0/threaded
SecurityFocus
-
http://www.zerodayinitiative.com/advisories/ZDI-11-134/
ZDI-11-134 | Zero Day Initiative
-
http://www.securityfocus.com/archive/1/517491/100/0/threaded
SecurityFocus
-
http://www.zerodayinitiative.com/advisories/ZDI-11-129/
ZDI-11-129 | Zero Day Initiative
-
http://securityreason.com/securityalert/8403
CA Total Defense Suite reGenerateReports Stored Procedure SQL Injection - CXSecurity.com
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66725
CA Total Defense multiple SQL injection CVE-2011-1653 Vulnerability Report
-
http://www.zerodayinitiative.com/advisories/ZDI-11-128/
ZDI-11-128 | Zero Day Initiative
Jump to