[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] =?windows-1252?q?DSA-2018-152=3A_RSA=AE_Authentication_Manag?= =?windows-1252?q?er_Multiple_Vul
From:       <secure () Dell ! com>
Date:       2018-09-21 14:15:00
Message-ID: 28d52f0c9be347b6ae568cd9bc3fa73e () AUSX13MPS306 ! AMER ! DELL ! COM
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

DSA-2018-152: RSA® Authentication Manager Multiple Vulnerabilities

Dell EMC Identifier: DSA-2018-152
 
CVE Identifier:  CVE-2018-11073, CVE-2018-11074, CVE-2018-11075
 
Severity: Medium
 
Severity Rating:  View the details below for the individual CVSS Score for each CVE.
 
Affected Products:
•         RSA Authentication Manager versions prior to 8.3 Patch 3
RSA Authentication Manager web-tier server versions prior to 8.3 Patch 3
•         RSA Authentication Manager Language Pack versions prior to 8.3 Patch 3 \
(CVE-2018-11074 only)   
Summary:
RSA Authentication Manager contains fixes for multiple security vulnerabilities that could \
potentially be exploited by malicious users to compromise the affected system.  
Details:
Multiple components within RSA Authentication Manager have been updated to address various \
vulnerabilities.  
The components are updated for the following vulnerabilities:
 
•         Stored Cross-Site Scripting (CVE 2018-11073)
RSA Authentication Manager versions prior to 8.3 P3 contain a stored cross-site scripting \
vulnerability in the Operations Console. A malicious Operations Console administrator could \
exploit this vulnerability to store arbitrary HTML or JavaScript code through the web \
interface. When other Operations Console administrators open the affected page, the injected \
scripts could potentially be executed in their browser. CVSSv3 Base Score: 6.5 \
(AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)  
•         DOM-Based Cross-Site Scripting (CVE-2018-11074)
RSA Authentication Manager versions prior to 8.3 P3 are affected by a DOM-based cross-site \
scripting vulnerability which exists in its embedded MadCap Flare Help files. A remote \
unauthenticated attacker could potentially exploit this vulnerability by tricking a victim \
application user to supply malicious HTML or JavaScript code to the browser DOM, which code is \
then executed by the web browser in the context of the vulnerable web application CVSSv3 Base \
Score 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

 
•         Reflected Cross-Site Scripting (CVE-2018-11075)
RSA Authentication Manager versions prior to 8.3 P3 contain a reflected cross-site scripting \
vulnerability in a Security Console page. A remote, unauthenticated malicious user, with the \
knowledge of a target user's anti-CSRF token, could potentially exploit this vulnerability by \
tricking a victim Security Console user to supply malicious HTML or JavaScript code to the \
vulnerable web application, which code is then executed by the victim's web browser in the \
context of the vulnerable web application. CVSSv3 Base SCore: 5.8 \
(AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)  
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned \
here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To \
search for a particular CVE, use the database's search utility at \
http://web.nvd.nist.gov/view/vuln/search.   
Recommendation:
The following RSA Authentication Manager releases contain resolutions to these vulnerabilities:
•         RSA Authentication Manager 8.3 Patch 3 and later
•         RSA Authentication Manager 8.3 Patch 3 and later web-tier server
•         RSA Authentication Manager Language Packs version 8.3 P3 and later (CVE-2018-11074)
 
RSA recommends all customers upgrade at the earliest opportunity.
 
Credit: RSA would like to thank Mantas Juskauskas from SEC Consult Vulnerability for reporting \
CVE-2018-11074.

Severity Rating

For an explanation of Severity Ratings, refer to the Security Advisories Severity Rating \
(https://community.rsa.com/docs/DOC-47147) knowledge base article. RSA recommends all customers \
take into account both the base score and any relevant temporal and environmental scores which \
may impact the potential severity associated with particular security vulnerability.


Legal Information

Read and use the information in this RSA Security Advisory to assist in avoiding any situation \
that might arise from the problems described herein. If you have any questions regarding this \
advisory, contact RSA Technical Support (https://community.rsa.com/docs/DOC-1294). RSA Security \
LLC and its affiliates, including without limitation, its ultimate parent company, Dell \
Technologies, distribute RSA Security Advisories in order to bring to the attention of users of \
the affected RSA products, important security information. RSA recommends that all users \
determine the applicability of this information to their individual situations and take \
appropriate action. The information set forth herein is provided "as is" without warranty of \
any kind. RSA disclaims all warranties, either express or implied, including the warranties of \
merchantability, fitness for a particular purpose, title and non-infringement. In no event \
shall RSA, its affiliates or its suppliers, be liable for any damages whatsoever including \
direct, indirect, incidental, consequential, loss of business profits or special damages, even \
if RSA, its affiliates or its suppliers have been advised of the possibility of such damages. \
Some jurisdictions do not allow the exclusion or limitation of liability for consequential or \
incidental damages, so the foregoing limitation may not apply.


Dell EMC Product Security Incident Response Team

secure@dell.com

http://www.emc.com/products/security/product-security-response-center.htm
-----BEGIN PGP SIGNATURE-----
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=7byV
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic