A vulnerability in the ImageID parameter of Cisco Unity Connection 10.5(2) could allow an unauthenticated, remote attacker to access files in arbitrary locations on the filesystem of an affected device. The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. Cisco Bug IDs: CSCvd90118.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cuc | Vendor Advisory |
http://www.securityfocus.com/bid/98286 | Broken Link |
http://www.securitytracker.com/id/1038400 |
Configurations
Information
Published : 2017-05-03 14:59
Updated : 2017-07-10 18:33
NVD link : CVE-2017-6629
Mitre link : CVE-2017-6629
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
cisco
- unity_connection