Executive Summary
Summary | |
---|---|
Title | Cisco Data Center Network Manager Path Traversal Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20180828-dcnm-traversal | First vendor Publication | 2018-08-28 |
Vendor | Cisco | Last vendor Modification | 2018-08-28 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5.5 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system. The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending malicious requests containing directory traversal character sequences within the management interface. An exploit could allow the attacker to view or create arbitrary files on the targeted system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJbhbnKXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfcz7NUP/1ByurEVz1l/8PhzGZz14C5AFzYQ rM9BM0hgA6LAOGdCRpYXOIW4TMibaIiz42aL7UJlw9ese3pJjA50SbLxy1cVbHkB KENpgw+lXxl6+X5HhO2yURGvNspobUjsWk1e/HeAeqKE+lOwbgCOcHhn9LLZMhYL ksRn9Syd2gYcFaUY+Zh6AOlIJhObW9tmF+hUbvisdHFEIPL2xIGXrcsTAYXY1vcE 3YBL5GcU54x5ALs2HVu8JczWPWhQC/pWLNeKsdi5XJus3I0aYvAQsGmld83SkEk +jl+5Dl1eTlLnm0S5iwV2rlrPrZoGzGzpgJKaOby5JOkMedXV3CZ7K7IJ5tBXt1ia B5j3wBEwZ4xPCetuckaUEg+MAEoBKRow6RSrxlpeh+VopknBhtWT923yfhNB/Cbe VBy2+FrRNJuEWkOXTf0Z1ofIJGSdZkZmakpBu+PPNC3gjTr6UHEnAeDT/7gSExZU tTUrrhOzahS+3I7865NiC93lRz/BqaZt38qd9NMKQ7eeez3tKcb7eFcHZgb4NEtV aepHk8rF8iJ4LgOV4+dQR4o+KENP7AiXd5qJdB1IuuazC87mO1M5JHHrBQLJTSFM fBX0AaZVeeF2AJPKQhDtRCZOhdAPYAJ+QLQP3ViNJQ0soUQaWm1q8ZYoZ2yDYn9f YKBsh84BFhmo7deK =io/g END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-08-21 | Name : A network management system running on the remote host is affected by a path ... File : cisco_dcnm_download_servlet_path_traversal.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2019-01-11 17:21:13 |
|
2018-10-05 21:21:50 |
|
2018-08-29 00:19:14 |
|