Executive Summary
Summary | |
---|---|
Title | Cisco Unified Contact Center Express Directory Traversal Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20111026-uccx | First vendor Publication | N/A |
Vendor | Cisco | Last vendor Modification | 2011-10-26 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Unified Contact Center Express (UCCX or Unified CCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) contain a directory traversal vulnerability that may allow a remote, unauthenticated attacker to retrieve arbitrary files from the filesystem. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-01-26 | Name : Multiple Cisco Products 'file' Parameter () Directory Traversal Vulnerability File : nvt/gb_cisco_multiple_products_50372.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76572 | Cisco Multiple Products Unspecified URI Traversal Aribtrary File Access Multiple Cisco products contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the URL. This directory traversal attack would allow the attacker to access arbitrary files. |
Snort® IPS/IDS
Date | Description |
---|---|
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39187 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39186 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39185 - Revision : 2 - Type : SERVER-WEBAPP |