OpenCA.ca.Access

description-logoDescription


It indicates a request to /cgi-bin/ca/ca of OpenCA which may be vulnerable to HTTP injection attack.



Due to insufficient front-end input validation using a web form, an attacker can inject malicious HTML code into the OpenCA PKI system. Upon successful injection, the code persists in the system. It can be used to modify user data on the OpenCA system and to launch cross-site scripting attacks on other client nodes.


Related signatures
OpenCA.RAServer.Access
OpenCA.ldap.Access
OpenCA.node.Access
OpenCA.pki.Access
OpenCA.scepd.Access

affected-products-logoAffected Products

Any unpatched OpenCA OpenCA 0.9.2 RC6 and all prior releases is vulnerable to the attack.

Impact logoImpact

Attackers can modify user data on the victim OpenCA system and launch further attacks on other client nodes.

recomended-action-logoRecommended Actions


Apply appropriate patches or upgrade OpenCA software to the latest non-vulnerable version.

Coverage

IPS (Regular DB)
IPS (Extended DB)

References

1