Insufficient output sanitization in the Automic Web Interface (AWI), in CA Automic Workload Automation 12.0 to 12.2, allow attackers to potentially conduct persistent cross site scripting (XSS) attacks via a crafted object.
References
Link | Resource |
---|---|
https://support.ca.com/us/product-content/recommended-reading/security-notices/CA20190124-01-security-notice-for-ca-automic-workload-automation.html | Vendor Advisory |
https://seclists.org/fulldisclosure/2019/Jan/61 | Mailing List Third Party Advisory |
https://sec-consult.com/en/blog/advisories/cross-site-scripting-in-ca-automic-workload-automation-web-interface-formerly-automic-automation-engine/ | Third Party Advisory |
https://packetstormsecurity.com/files/151325/CA-Automic-Workload-Automation-12.x-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
https://marc.info/?l=bugtraq&m=154874504200510&w=2 | Mailing List Third Party Advisory |
https://communities.ca.com/community/product-vulnerability-response/blog/2019/01/24/ca20190124-01-security-notice-for-ca-automic-workload-automation | Vendor Advisory |
http://www.securityfocus.com/bid/106755 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-02-05 16:29
Updated : 2021-04-07 11:13
NVD link : CVE-2019-6504
Mitre link : CVE-2019-6504
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
broadcom
- automic_workload_automation