CVE-2020-5331
https://notcve.org/view.php?id=CVE-2020-5331
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. RSA Archer, versiones anteriores a la versión 6.7 P3 (6.7.0.3), contienen una vulnerabilidad de exposición de información. La información de sesión de los usuarios podría ser almacenada potencialmente en la caché o los archivos de registro. • https://www.dell.com/support/security/en-us/details/DOC-111112/DSA-2020-049-RSA-Archer-Security-Update-for-Multiple-Vulnerabilities • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-598: Use of GET Request Method With Sensitive Query Strings •
CVE-2019-3758
https://notcve.org/view.php?id=CVE-2019-3758
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts. RSA Archer, versiones anteriores a 6.6 P2 (6.6.0.2), contienen una vulnerabilidad de autenticación inapropiada. La vulnerabilidad permite a los administradores de sistema crear cuentas de usuario con credenciales insuficientes. • https://community.rsa.com/docs/DOC-106759 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-521: Weak Password Requirements •
CVE-2019-3756
https://notcve.org/view.php?id=CVE-2019-3756
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions. RSA Archer, versiones anteriores a 6.6 P3 (6.6.0.3), contienen una vulnerabilidad de divulgación de información. La información relacionada con la base de datos del backend es divulgada en la IU de usuarios de RSA Archer poco privilegiados bajo ciertas condiciones de error. • https://community.rsa.com/docs/DOC-106759 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2018-11065
https://notcve.org/view.php?id=CVE-2018-11065
The WorkPoint component, which is embedded in all RSA Archer, versions 6.1.x, 6.2.x, 6.3.x prior to 6.3.0.7 and 6.4.x prior to 6.4.0.1, contains a SQL injection vulnerability. A malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to read certain data. Embedded WorkPoint is upgraded to version 4.10.16, which contains a fix for the vulnerability. El componente WorkPoint que está embebido en RSA Archer, en versiones 6.1.x, 6.2.x, 6.3.x anteriores a la 6.3.0.7 y 6.4.x anteriores a la 6.4.0.1, contiene una vulnerabilidad de inyección SQL. Un usuario malicioso podría explotar esta vulnerabilidad para ejecutar comandos SQL en la base de datos del backend para leer ciertos datos. • http://seclists.org/fulldisclosure/2018/Aug/31 http://www.securityfocus.com/bid/105128 http://www.securitytracker.com/id/1041540 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-11060
https://notcve.org/view.php?id=CVE-2018-11060
RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges. RSA Archer, en versiones anteriores a la 6.4.0.1, contiene una vulnerabilidad de omisión de autorización en la API REST. Un usuario autenticado remoto malicioso de Archer podría explotar esta vulnerabilidad para elevar sus privilegios. • http://seclists.org/fulldisclosure/2018/Jul/69 http://www.securityfocus.com/bid/104892 http://www.securitytracker.com/id/1041359 •