ID

VAR-201310-0511


CVE

CVE-2013-5528


TITLE

Cisco Unified Communications Manager of Tomcat management Web Directory traversal vulnerability in the interface

Trust: 0.8

sources: JVNDB: JVNDB-2013-004601

DESCRIPTION

Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815. Exploiting this issue can allow an attacker to gain access to arbitrary files. Information harvested may aid in launching further attacks. This issue is being tracked by Cisco Bug ID CSCui78815. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. The vulnerability is due to a failure to properly sanitize user-supplied input passed to a specific function. An attacker could exploit this vulnerability by supplying a series of directory traversal characters, allowing the malicious user to designate a file outside the restricted directory to be returned. An exploit could allow the malicious user to obtain the contents of any file that is readable by the Apache Tomcat service account. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must be able to authenticate to a targeted device. This access requirement decreases the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available

Trust: 2.07

sources: NVD: CVE-2013-5528 // JVNDB: JVNDB-2013-004601 // BID: 62960 // VULHUB: VHN-65530 // VULMON: CVE-2013-5528

AFFECTED PRODUCTS

vendor:ciscomodel:unified communications managerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:lteversion:9.1(1)

Trust: 0.8

vendor:ciscomodel:unified communications managerscope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications managerscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.0(1)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(3)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0(2)

Trust: 0.3

sources: BID: 62960 // JVNDB: JVNDB-2013-004601 // CNNVD: CNNVD-201310-182 // NVD: CVE-2013-5528

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5528
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-5528
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201310-182
value: MEDIUM

Trust: 0.6

VULHUB: VHN-65530
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-5528
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-5528
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-65530
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-65530 // VULMON: CVE-2013-5528 // JVNDB: JVNDB-2013-004601 // CNNVD: CNNVD-201310-182 // NVD: CVE-2013-5528

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-65530 // JVNDB: JVNDB-2013-004601 // NVD: CVE-2013-5528

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-182

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201310-182

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004601

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-65530 // VULMON: CVE-2013-5528

PATCH

title:Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528

Trust: 0.8

title:31221url:http://tools.cisco.com/security/center/viewAlert.x?alertId=31221

Trust: 0.8

title:Cisco: Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=Cisco-SA-20131011-CVE-2013-5528

Trust: 0.1

title:Kenzer Templates [5170] [DEPRECATED]url:https://github.com/ARPSyndicate/kenzer-templates

Trust: 0.1

sources: VULMON: CVE-2013-5528 // JVNDB: JVNDB-2013-004601

EXTERNAL IDS

db:NVDid:CVE-2013-5528

Trust: 2.9

db:BIDid:62960

Trust: 1.5

db:EXPLOIT-DBid:40887

Trust: 1.2

db:OSVDBid:98336

Trust: 1.2

db:PACKETSTORMid:140071

Trust: 1.2

db:JVNDBid:JVNDB-2013-004601

Trust: 0.8

db:CNNVDid:CNNVD-201310-182

Trust: 0.7

db:CISCOid:20131010 CISCO UNIFIED COMMUNICATIONS MANAGER ADMINISTRATIVE WEB INTERFACE DIRECTORY TRAVERSAL VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-65530

Trust: 0.1

db:VULMONid:CVE-2013-5528

Trust: 0.1

sources: VULHUB: VHN-65530 // VULMON: CVE-2013-5528 // BID: 62960 // JVNDB: JVNDB-2013-004601 // CNNVD: CNNVD-201310-182 // NVD: CVE-2013-5528

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5528

Trust: 1.8

url:https://www.exploit-db.com/exploits/40887/

Trust: 1.3

url:http://www.securityfocus.com/bid/62960

Trust: 1.2

url:http://packetstormsecurity.com/files/140071/cisco-unified-communications-manager-7-8-9-directory-traversal.html

Trust: 1.2

url:http://osvdb.org/98336

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5528

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5528

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131011-cve-2013-5528

Trust: 0.1

url:https://github.com/arpsyndicate/kenzer-templates

Trust: 0.1

sources: VULHUB: VHN-65530 // VULMON: CVE-2013-5528 // BID: 62960 // JVNDB: JVNDB-2013-004601 // CNNVD: CNNVD-201310-182 // NVD: CVE-2013-5528

CREDITS

Cisco

Trust: 0.3

sources: BID: 62960

SOURCES

db:VULHUBid:VHN-65530
db:VULMONid:CVE-2013-5528
db:BIDid:62960
db:JVNDBid:JVNDB-2013-004601
db:CNNVDid:CNNVD-201310-182
db:NVDid:CVE-2013-5528

LAST UPDATE DATE

2024-11-23T23:12:48.377000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-65530date:2017-01-04T00:00:00
db:VULMONid:CVE-2013-5528date:2017-01-04T00:00:00
db:BIDid:62960date:2013-10-16T01:34:00
db:JVNDBid:JVNDB-2013-004601date:2013-10-15T00:00:00
db:CNNVDid:CNNVD-201310-182date:2013-10-16T00:00:00
db:NVDid:CVE-2013-5528date:2024-11-21T01:57:38.763

SOURCES RELEASE DATE

db:VULHUBid:VHN-65530date:2013-10-11T00:00:00
db:VULMONid:CVE-2013-5528date:2013-10-11T00:00:00
db:BIDid:62960date:2013-10-10T00:00:00
db:JVNDBid:JVNDB-2013-004601date:2013-10-15T00:00:00
db:CNNVDid:CNNVD-201310-182date:2013-10-15T00:00:00
db:NVDid:CVE-2013-5528date:2013-10-11T03:54:53.800