CompanySecurity Spotlight
Return
DDI's Vulnerability Research Team Announces Discovery: DDIVRT-2013-53 Actuate 'ActuateJavaComponent' Multiple Vulnerabilities

 

Severity

--------

High

Date Discovered

---------------

March 19, 2013

Discovered By

-------------

Digital Defense, Inc. Vulnerability Research Team

Credit: Dennis Lavrinenko, Bobby Lockett, and r@b13$

1. Actuate 'ActuateJavaComponent' Arbitrary File Retrieval

Vulnerability Description

-------------------------

Actuate 10 contains a vulnerability within the 'ActuateJavaComponent'. This component allows unauthenticated attackers to retrieve arbitrary system files located outside of the web root.

Solution Description

--------------------

A solution for this security issue is not available at this time. End-users can mitigate this flaw by limiting access to affected systems through the use of access controls.

2. Actuate 'ActuateJavaComponent' Arbitrary Directory Browsing Vulnerability

Vulnerability Description

-------------------------

Actuate 10 contains an arbitrary directory browsing vulnerability within the 'ActuateJavaComponent'. This vulnerability allows the contents of any drive or directory to be browsed within the web application's interface.

Solution Description

--------------------

A solution for this security issue is not available at this time. End-users can mitigate this flaw by limiting access to affected systems through the use of access controls.

Tested Systems / Software

-------------------------

Actuate 10 Service Pack 1 Fix 4

Vendor Contact

--------------

Vendor Name: Actuate Corporation

Vendor Website: http://www.actuate.com/home/

 

Alert Center

07/28/2014 » CVE-2014-3120
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. [READ ME]

Visit DDI Alert Center