CVE-2019-3716 – Information Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2019-3716
RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks. RSA Archer, en CVErsiones anteriores a la 6.5 SP2, contiene una vulnerabilidad de exposición de información. La contraseña de conexión a la base de datos podría almacenarse en texto plano en los archivos de registro de RSA Archer. • http://www.securityfocus.com/bid/107406 https://seclists.org/fulldisclosure/2019/Mar/19 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2019-3715 – Information Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2019-3715
RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. RSA Archer, en CVErsiones anteriores a la 6.5 SP1, contiene una vulnerabilidad de exposición de información. La información de las sesiones de usuario se almacena en texto plano en los archivos de registro de RSA Archer. • http://www.securityfocus.com/bid/107443 https://seclists.org/fulldisclosure/2019/Mar/19 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2018-15780 – DSA-2018-224: RSA Archer GRC Platform Improper Access Control Vulnerability
https://notcve.org/view.php?id=CVE-2018-15780
RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information. Las versiones de RSA Archer anteriores a la 6.5.0.1 contienen una vulnerabilidad de control de acceso incorrecto. Un usuario remoto malicioso podría aprovechar esta vulnerabilidad para omitir comprobaciones de autorización y ganar acceso de lectura a información restringida de los usuarios. • http://www.securityfocus.com/bid/106396 https://seclists.org/fulldisclosure/2019/Jan/3 •
CVE-2017-8016
https://notcve.org/view.php?id=CVE-2017-8016
RSA Archer GRC Platform prior to 6.2.0.5 is affected by stored cross-site scripting via the Questionnaire ID field. An authenticated attacker may potentially exploit this to execute arbitrary HTML in the user's browser session in the context of the affected RSA Archer application. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por Cross-Site Scripting (XSS) persistente mediante el campo Questionnaire ID. Un atacante autenticado podría explotarlo para ejecutar código HTML arbitrario en la sesión del navegador del usuario en el contexto de la aplicación RSA Archer afectada. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securitytracker.com/id/1039518 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-14370
https://notcve.org/view.php?id=CVE-2017-14370
RSA Archer GRC Platform prior to 6.2.0.5 is affected by stored cross-site scripting via the Source Asset ID field. An authenticated attacker may potentially exploit this to execute arbitrary HTML in the user's browser session in the context of the affected RSA Archer application. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por un Cross-Site Scripting (XSS) persistente mediante el campo Source Asset ID. Un atacante autenticado podría explotarlo para ejecutar HTML arbitrario en la sesión del buscador del usuario, en el contexto de una aplicación RSA Archer afectada. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securitytracker.com/id/1039518 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •