Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Kotas, Kevin J (Kevin.Kotasca.com)
Date: Tue Feb 23 2010 - 14:32:45 CST
-----BEGIN PGP SIGNED MESSAGE-----
CA20100223-01: Security Notice for CA eHealth Performance Manager
Issued: February 23, 2010
CA's support is alerting customers to a security risk with CA eHealth
Performance Manager. A cross-site scripting vulnerability exists that
can allow a remote attacker to potentially gain sensitive
information. CA has provided guidance to remediate the vulnerability.
The vulnerability, CVE-2010-0640, is due to insufficient validation
of certain characters in web interface requests. An attacker, who
can have an unsuspecting user follow a malicious URL, can conduct
cross-site scripting attacks.
CA eHealth Performance Manager 6.0.x
CA eHealth Performance Manager 6.1.x
CA eHealth Performance Manager 6.2.x
How to determine if the installation is affected
See the Solution section to determine if the "Scan user input for
potentially malicious HTML content" configuration setting is enabled.
To remediate the vulnerability, enable the "Scan user input for
potentially malicious HTML content" configuration setting as follows:
1) Log into the eHealth Web Interface as the "Admin" user
2) Navigate to the "Administration" tab
3) Select the "Site Configuration" link
4) Locate the "Scan user input for potentially malicious HTML
content" option and modify its value from "No" to "Yes"
5) Select "Save" to implement the new configuration setting
CVE-2010-0640 - eHealth Performance Manager XSS
CVE-2010-0640 - Tony Fogarty DNV IT Global Services Limited
Version 1.0: Initial Release
If additional information is required, please contact CA Support at
If you discover a vulnerability in CA products, please report your
findings to the CA Product Vulnerability Response Team.
(line may wrap)
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/