A vulnerability in the web framework of Cisco Unified Communications Manager 11.5(1.10000.6) could allow an authenticated, remote attacker to access arbitrary files in the context of the web root directory structure on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques to read files in the web root directory structure on the Cisco Unified Communications Manager filesystem. Cisco Bug IDs: CSCve13796.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ucm1 | Vendor Advisory |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13796 | Vendor Advisory |
http://www.securitytracker.com/id/1039064 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/100119 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-06 23:29
Updated : 2019-10-09 16:29
NVD link : CVE-2017-6758
Mitre link : CVE-2017-6758
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
cisco
- unified_communications_manager