Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-3315 | First vendor Publication | 2011-10-27 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3315 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-01-26 | Name : Multiple Cisco Products 'file' Parameter () Directory Traversal Vulnerability File : nvt/gb_cisco_multiple_products_50372.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76572 | Cisco Multiple Products Unspecified URI Traversal Aribtrary File Access Multiple Cisco products contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the URL. This directory traversal attack would allow the attacker to access arbitrary files. |
Snort® IPS/IDS
Date | Description |
---|---|
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39187 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39186 - Revision : 2 - Type : SERVER-WEBAPP |
2016-07-13 | Cisco Unified Interactive Voice Response directory traversal attempt RuleID : 39185 - Revision : 2 - Type : SERVER-WEBAPP |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:40 |
|
2024-11-28 12:27:03 |
|
2020-05-23 00:31:03 |
|
2016-06-28 18:48:55 |
|
2014-02-28 13:21:27 |
|
2013-05-10 23:07:02 |
|