Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Cisco Data Center Network Manager Path Traversal Vulnerability
Informations
Name cisco-sa-20180828-dcnm-traversal First vendor Publication 2018-08-28
Vendor Cisco Last vendor Modification 2018-08-28
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:N)
Cvss Base Score 5.5 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system.

The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending malicious requests containing directory traversal character sequences within the management interface. An exploit could allow the attacker to view or create arbitrary files on the targeted system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJbhbnKXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfcz7NUP/1ByurEVz1l/8PhzGZz14C5AFzYQ rM9BM0hgA6LAOGdCRpYXOIW4TMibaIiz42aL7UJlw9ese3pJjA50SbLxy1cVbHkB KENpgw+lXxl6+X5HhO2yURGvNspobUjsWk1e/HeAeqKE+lOwbgCOcHhn9LLZMhYL ksRn9Syd2gYcFaUY+Zh6AOlIJhObW9tmF+hUbvisdHFEIPL2xIGXrcsTAYXY1vcE 3YBL5GcU54x5ALs2HVu8JczWPWhQC/pWLNeKsdi5XJus3I0aYvAQsGmld83SkEk +jl+5Dl1eTlLnm0S5iwV2rlrPrZoGzGzpgJKaOby5JOkMedXV3CZ7K7IJ5tBXt1ia B5j3wBEwZ4xPCetuckaUEg+MAEoBKRow6RSrxlpeh+VopknBhtWT923yfhNB/Cbe VBy2+FrRNJuEWkOXTf0Z1ofIJGSdZkZmakpBu+PPNC3gjTr6UHEnAeDT/7gSExZU tTUrrhOzahS+3I7865NiC93lRz/BqaZt38qd9NMKQ7eeez3tKcb7eFcHZgb4NEtV aepHk8rF8iJ4LgOV4+dQR4o+KENP7AiXd5qJdB1IuuazC87mO1M5JHHrBQLJTSFM fBX0AaZVeeF2AJPKQhDtRCZOhdAPYAJ+QLQP3ViNJQ0soUQaWm1q8ZYoZ2yDYn9f YKBsh84BFhmo7deK =io/g END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9

Nessus® Vulnerability Scanner

Date Description
2018-08-21 Name : A network management system running on the remote host is affected by a path ...
File : cisco_dcnm_download_servlet_path_traversal.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2019-01-11 17:21:13
  • Multiple Updates
2018-10-05 21:21:50
  • Multiple Updates
2018-08-29 00:19:14
  • First insertion