In this Section

Sense of Security – Security Advisory – SOS-18-001 – CA Workload Automation AE RCE

Sense of Security – Security Advisory – SOS-18-001

Release Date. 29-Mar-2018
Last Update.
Vendor Notification Date. 25-Oct-2017
Product. CA Workload Automation AE
Platform. Windows
Affected versions. CA Workload Control Center (CA WCC) r11.4 SP5 and earlier
Severity Rating. High
Impact. System Access
Attack Vector. Remote with authentication
Solution Status. CA WCC Release 11.4 SP6
CVE reference. CVE-2018-8954

Details

CA Workload Automation AE (AutoSys Edition) is a workload automation tool supplied by CA Technologies. Apache MyFaces is an implementation of Java Server Faces (JSF). CA Workload Automation AE uses MyFaces client-side ViewState and has disabled the default encryption (i.e. org.apache.myfaces.USE_ENCRYPTION). As a result, the attacker can send a malicious serialised payload in the ViewState back to the server. MyFaces will try to deserialise the provided ViewState and the payload will be executed even before the deserialisation of the ViewState has ended. This allows an authenticated remote attacker to conduct remote code execution attacks and obtain system level access.

All URLs that accept javax.faces.ViewStateparameter are vulnerable to this attack.

Please refer to the PDF version of this advisory for proof of concept code examples.

Solution

Apply patch from CA WCC Release 11.4 SP6 (https://docops.ca.com/ca-workload-automation-ae/11-4-2/en/release-notes/ca-wcc-release-notes/ca-wcc-release-11-4-sp6) released on 8 March 2018.

Additional information is available at:

https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180329-01–security-notice-for-ca-workload-automation-ae.html

Discovered By

Hamed Merati and Kacper Nowak from Sense of Security Labs.