TippingPoint Zero Day Initiative

CA ERwin Web Portal MIMM ConfigServiceProviderServlet Remote File Creation/Overwrite Vulnerability

ZDI-14-093: April 17th, 2014


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 13553. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to overwrite arbitrary .xml files on a system with vulnerable installations of CA ERwin Web Portal's Meta Integration Metadata Management service. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the "Meta Integration Web Server and Services" ConfigServiceProviderServlet servlet which is vulnerable to a directory traversal. An attacker can leverage this vulnerability to overwrite or create arbitrary application and system XML files, including necessary configuration files, under the context of SYSTEM. An attacker can couple this vulnerability with others to gain remote code execution.

Vendor Response

CA has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2014-04-11 - Vulnerability reported to vendor
    2014-04-17 - Coordinated public release of advisory


This vulnerability was discovered by:
    Andrea Micalizzi aka rgod