A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-traversal | Vendor Advisory |
http://www.securitytracker.com/id/1041926 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/105671 | Broken Link Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-10-17 15:29
Updated : 2023-02-03 11:21
NVD link : CVE-2018-0420
Mitre link : CVE-2018-0420
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
cisco
- wireless_lan_controller_software