ID

VAR-201905-0517


CVE

CVE-2019-1820


TITLE

Cisco Prime Infrastructure and Evolved Programmable Network Manager Path traversal vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-004650

DESCRIPTION

A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information. This issue is being tracked by Cisco Bug ID CSCvo28684 and CSCvo62276. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths. The following products and versions are affected: Cisco PI Software versions prior to 3.4, versions prior to 3.5, and versions prior to 3.6; Cisco EPN Manager versions prior to 3.0.1

Trust: 1.98

sources: NVD: CVE-2019-1820 // JVNDB: JVNDB-2019-004650 // BID: 108345 // VULHUB: VHN-150522

AFFECTED PRODUCTS

vendor:ciscomodel:evolved programmable network managerscope:ltversion:3.0.1

Trust: 1.0

vendor:ciscomodel:prime infrastructurescope:ltversion:3.4

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:prime infrastructurescope: - version: -

Trust: 0.8

vendor:ciscomodel:prime infrastructurescope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:evolved programmable network managerscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:neversion:3.6

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:neversion:3.5

Trust: 0.3

vendor:ciscomodel:prime infrastructurescope:neversion:3.4

Trust: 0.3

vendor:ciscomodel:evolved programmable network managerscope:neversion:3.0.1

Trust: 0.3

sources: BID: 108345 // JVNDB: JVNDB-2019-004650 // NVD: CVE-2019-1820

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1820
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1820
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1820
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-695
value: MEDIUM

Trust: 0.6

VULHUB: VHN-150522
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1820
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-150522
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1820
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1820
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-150522 // JVNDB: JVNDB-2019-004650 // CNNVD: CNNVD-201905-695 // NVD: CVE-2019-1820 // NVD: CVE-2019-1820

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-150522 // JVNDB: JVNDB-2019-004650 // NVD: CVE-2019-1820

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-695

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201905-695

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004650

PATCH

title:cisco-sa-20190515-pi-pathtrav-1820url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-pathtrav-1820

Trust: 0.8

title:Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92819

Trust: 0.6

sources: JVNDB: JVNDB-2019-004650 // CNNVD: CNNVD-201905-695

EXTERNAL IDS

db:NVDid:CVE-2019-1820

Trust: 2.8

db:BIDid:108345

Trust: 2.0

db:JVNDBid:JVNDB-2019-004650

Trust: 0.8

db:CNNVDid:CNNVD-201905-695

Trust: 0.7

db:AUSCERTid:ESB-2019.1753

Trust: 0.6

db:VULHUBid:VHN-150522

Trust: 0.1

sources: VULHUB: VHN-150522 // BID: 108345 // JVNDB: JVNDB-2019-004650 // CNNVD: CNNVD-201905-695 // NVD: CVE-2019-1820

REFERENCES

url:http://www.securityfocus.com/bid/108345

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-pi-pathtrav-1820

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1820

Trust: 1.4

url:http://www.cisco.com

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1820

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-pi-pathtrav-1819

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-prime-infrastructure-multiple-vulnerabilities-via-the-web-console-web-29342

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81094

Trust: 0.6

sources: VULHUB: VHN-150522 // BID: 108345 // JVNDB: JVNDB-2019-004650 // CNNVD: CNNVD-201905-695 // NVD: CVE-2019-1820

CREDITS

Steven Seeley (mr_me) of Source Incite.

Trust: 0.9

sources: BID: 108345 // CNNVD: CNNVD-201905-695

SOURCES

db:VULHUBid:VHN-150522
db:BIDid:108345
db:JVNDBid:JVNDB-2019-004650
db:CNNVDid:CNNVD-201905-695
db:NVDid:CVE-2019-1820

LAST UPDATE DATE

2024-11-23T21:59:57.233000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-150522date:2019-10-09T00:00:00
db:BIDid:108345date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004650date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-695date:2019-05-21T00:00:00
db:NVDid:CVE-2019-1820date:2024-11-21T04:37:27.933

SOURCES RELEASE DATE

db:VULHUBid:VHN-150522date:2019-05-16T00:00:00
db:BIDid:108345date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004650date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-695date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1820date:2019-05-16T01:29:00.420