// For flags

CVE-2018-13825

CA PPM Password Storage / SQL Injection / XML Injection

Severity Score

6.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Insufficient input validation in the gridExcelExport functionality, in CA PPM 14.3 and below, 14.4, 15.1, 15.2 CP5 and below, and 15.3 CP2 and below, allows remote attackers to execute reflected cross-site scripting attacks.

La validaciĆ³n insuficiente de entradas en la funcionalidad gridExcelExport en CA PPM 14.3 y anteriores, 14.4, 15.1, 15.2 CP5 y anteriores y 15.3 CP2 y anteriores permite que los atacantes remotos ejecuten ataques de Cross-Site Scripting (XSS) reflejado.

CA Technologies Support is alerting customers to multiple potential risks with CA PPM (formerly CA Clarity PPM). Multiple vulnerabilities exist that can allow an attacker to conduct a variety of attacks. The first vulnerability has a medium risk rating and concerns an SSL password being stored in plain text, which can allow an attacker to access sensitive information. The second vulnerability has a high risk rating and concerns an XML external entity vulnerability in the XOG functionality, which can allow a remote attacker to access sensitive information. The third vulnerability has a high risk rating and concerns two parameters that fail to properly sanitize input, which can allow a remote attacker to execute SQL injection attacks. The fourth vulnerability has a high risk rating and concerns improper input validation by the gridExcelExport functionality, which can allow a remote attacker to execute reflected cross-site scripting attacks. The fifth vulnerability has a medium risk rating and concerns an XML external entity vulnerability in the XOG functionality, which can allow a remote attacker to conduct server side request forgery attacks.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-07-10 CVE Reserved
  • 2018-08-30 CVE Published
  • 2024-09-17 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Broadcom
Search vendor "Broadcom"
Project Portfolio Management
Search vendor "Broadcom" for product "Project Portfolio Management"
<= 14.3
Search vendor "Broadcom" for product "Project Portfolio Management" and version " <= 14.3"
-
Affected
Broadcom
Search vendor "Broadcom"
Project Portfolio Management
Search vendor "Broadcom" for product "Project Portfolio Management"
14.4
Search vendor "Broadcom" for product "Project Portfolio Management" and version "14.4"
-
Affected
Broadcom
Search vendor "Broadcom"
Project Portfolio Management
Search vendor "Broadcom" for product "Project Portfolio Management"
15.1
Search vendor "Broadcom" for product "Project Portfolio Management" and version "15.1"
-
Affected
Ca
Search vendor "Ca"
Project Portfolio Management
Search vendor "Ca" for product "Project Portfolio Management"
15.2
Search vendor "Ca" for product "Project Portfolio Management" and version "15.2"
cp5
Affected
Ca
Search vendor "Ca"
Project Portfolio Management
Search vendor "Ca" for product "Project Portfolio Management"
15.3
Search vendor "Ca" for product "Project Portfolio Management" and version "15.3"
cp2
Affected