Skip to main content

Untrusted Search Path


Severity High
Score 7.8/10


CA eHealth Performance Manager through is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

  • LOW
  • HIGH
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-426 - Untrusted Search Path

The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application's direct control.


Advisory Timeline

  • Published