ID

VAR-201705-3657


CVE

CVE-2017-6635


TITLE

Cisco Prime Collaboration Provisioning Software Web Vulnerabilities related to authorization, authority, and access control in the interface

Trust: 0.8

sources: JVNDB: JVNDB-2017-004238

DESCRIPTION

A vulnerability in the web interface of Cisco Prime Collaboration Provisioning Software (prior to Release 12.1) could allow an authenticated, remote attacker to delete any file from an affected system. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests and fails to apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request that uses directory traversal techniques to submit a path to a desired file location on an affected system. A successful exploit could allow the attacker to delete any file from the system. Cisco Bug IDs: CSCvc99597. Vendors have confirmed this vulnerability Bug ID CSCvc99597 It is released as.Information may be tampered with. Authentication is not required to exploit this vulnerability.The specific flaw exists within the licensestatus.jsp page, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. The software provides IP communications services functionality for IP telephony, voice mail, and unified communications environments

Trust: 2.61

sources: NVD: CVE-2017-6635 // JVNDB: JVNDB-2017-004238 // ZDI: ZDI-17-446 // BID: 98535 // VULHUB: VHN-114838

AFFECTED PRODUCTS

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.1.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6.2

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:9.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5.1

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:9.5.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.5.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:ltversion:12.1

Trust: 0.8

vendor:ciscomodel:prime collaboration provisioningscope: - version: -

Trust: 0.7

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.6

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.5

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.2

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:12.1

Trust: 0.3

sources: ZDI: ZDI-17-446 // BID: 98535 // JVNDB: JVNDB-2017-004238 // CNNVD: CNNVD-201705-910 // NVD: CVE-2017-6635

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6635
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6635
value: MEDIUM

Trust: 0.8

ZDI: CVE-2017-6635
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201705-910
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114838
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6635
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-6635
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-114838
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6635
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-17-446 // VULHUB: VHN-114838 // JVNDB: JVNDB-2017-004238 // CNNVD: CNNVD-201705-910 // NVD: CVE-2017-6635

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:CWE-862

Trust: 1.1

sources: VULHUB: VHN-114838 // JVNDB: JVNDB-2017-004238 // NVD: CVE-2017-6635

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-910

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201705-910

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004238

PATCH

title:cisco-sa-20170517-pcp3url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp3

Trust: 1.5

title:Cisco Prime Collaboration Provisioning Software Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70404

Trust: 0.6

sources: ZDI: ZDI-17-446 // JVNDB: JVNDB-2017-004238 // CNNVD: CNNVD-201705-910

EXTERNAL IDS

db:NVDid:CVE-2017-6635

Trust: 3.5

db:BIDid:98535

Trust: 2.0

db:SECTRACKid:1038514

Trust: 1.7

db:JVNDBid:JVNDB-2017-004238

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4467

Trust: 0.7

db:ZDIid:ZDI-17-446

Trust: 0.7

db:CNNVDid:CNNVD-201705-910

Trust: 0.7

db:VULHUBid:VHN-114838

Trust: 0.1

sources: ZDI: ZDI-17-446 // VULHUB: VHN-114838 // BID: 98535 // JVNDB: JVNDB-2017-004238 // CNNVD: CNNVD-201705-910 // NVD: CVE-2017-6635

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170517-pcp3

Trust: 2.7

url:http://www.securityfocus.com/bid/98535

Trust: 1.7

url:http://www.securitytracker.com/id/1038514

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6635

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6635

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: ZDI: ZDI-17-446 // VULHUB: VHN-114838 // BID: 98535 // JVNDB: JVNDB-2017-004238 // CNNVD: CNNVD-201705-910 // NVD: CVE-2017-6635

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-17-446

SOURCES

db:ZDIid:ZDI-17-446
db:VULHUBid:VHN-114838
db:BIDid:98535
db:JVNDBid:JVNDB-2017-004238
db:CNNVDid:CNNVD-201705-910
db:NVDid:CVE-2017-6635

LAST UPDATE DATE

2024-11-23T21:41:19.938000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-446date:2017-06-26T00:00:00
db:VULHUBid:VHN-114838date:2019-10-03T00:00:00
db:BIDid:98535date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004238date:2017-06-20T00:00:00
db:CNNVDid:CNNVD-201705-910date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6635date:2024-11-21T03:30:11.010

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-446date:2017-06-26T00:00:00
db:VULHUBid:VHN-114838date:2017-05-22T00:00:00
db:BIDid:98535date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004238date:2017-06-20T00:00:00
db:CNNVDid:CNNVD-201705-910date:2017-05-22T00:00:00
db:NVDid:CVE-2017-6635date:2017-05-22T01:29:00.367