Executive Summary
Summary | |
---|---|
Title | Cisco Unified Communications Manager Directory Traversal Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20111026-cucm | First vendor Publication | N/A |
Vendor | Cisco | Last vendor Modification | 2011-10-26 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Unified Communications Manager contains a directory traversal vulnerability that may allow an unauthenticated, remote attacker to retrieve arbitrary files from the filesystem. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-01-26 | Name : Multiple Cisco Products 'file' Parameter () Directory Traversal Vulnerability File : nvt/gb_cisco_multiple_products_50372.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76572 | Cisco Multiple Products Unspecified URI Traversal Aribtrary File Access Multiple Cisco products contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the URL. This directory traversal attack would allow the attacker to access arbitrary files. |
Snort® IPS/IDS
Date | Description |
---|---|
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39187 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39186 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39185 - Revision : 2 - Type : SERVER-WEBAPP |