ID

VAR-202004-1244


CVE

CVE-2020-3239


TITLE

Cisco UCS Director and Cisco UCS Director Express for Big Data Past Traversal Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004410

DESCRIPTION

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of zip files by the LargeFileUploadServlet endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root. Cisco UCS Director is a heterogeneous platform for Private Cloud Infrastructure as a Service (IaaS)

Trust: 2.43

sources: NVD: CVE-2020-3239 // JVNDB: JVNDB-2020-004410 // ZDI: ZDI-20-539 // VULHUB: VHN-181364 // VULMON: CVE-2020-3239

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 1.5

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:lteversion:3.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.4

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.3

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

sources: ZDI: ZDI-20-539 // JVNDB: JVNDB-2020-004410 // NVD: CVE-2020-3239

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3239
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3239
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-004410
value: HIGH

Trust: 0.8

ZDI: CVE-2020-3239
value: CRITICAL

Trust: 0.7

CNNVD: CNNVD-202004-1107
value: HIGH

Trust: 0.6

VULHUB: VHN-181364
value: HIGH

Trust: 0.1

VULMON: CVE-2020-3239
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-3239
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-004410
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181364
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3239
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3239
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004410
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-3239
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-539 // VULHUB: VHN-181364 // VULMON: CVE-2020-3239 // JVNDB: JVNDB-2020-004410 // CNNVD: CNNVD-202004-1107 // NVD: CVE-2020-3239 // NVD: CVE-2020-3239

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

problemtype:CWE-20

Trust: 1.0

sources: VULHUB: VHN-181364 // JVNDB: JVNDB-2020-004410 // NVD: CVE-2020-3239

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1107

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202004-1107

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004410

PATCH

title:cisco-sa-ucsd-mult-vulns-UNfpdW4Eurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 1.5

title:Cisco UCS Director and Cisco UCS Director Express for Big Data Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116445

Trust: 0.6

title:Cisco: Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Dataurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-cisco-ip-phone-rce-flaw/154864/

Trust: 0.1

sources: ZDI: ZDI-20-539 // VULMON: CVE-2020-3239 // JVNDB: JVNDB-2020-004410 // CNNVD: CNNVD-202004-1107

EXTERNAL IDS

db:NVDid:CVE-2020-3239

Trust: 3.3

db:ZDIid:ZDI-20-539

Trust: 2.5

db:JVNDBid:JVNDB-2020-004410

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9586

Trust: 0.7

db:CNNVDid:CNNVD-202004-1107

Trust: 0.7

db:AUSCERTid:ESB-2020.1327.2

Trust: 0.6

db:AUSCERTid:ESB-2020.1327

Trust: 0.6

db:CNVDid:CNVD-2020-25345

Trust: 0.1

db:VULHUBid:VHN-181364

Trust: 0.1

db:VULMONid:CVE-2020-3239

Trust: 0.1

sources: ZDI: ZDI-20-539 // VULHUB: VHN-181364 // VULMON: CVE-2020-3239 // JVNDB: JVNDB-2020-004410 // CNNVD: CNNVD-202004-1107 // NVD: CVE-2020-3239

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ucsd-mult-vulns-unfpdw4e

Trust: 3.2

url:https://www.zerodayinitiative.com/advisories/zdi-20-539/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-3239

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3239

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1327/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ucs-director-multiple-vulnerabilities-via-rest-api-32042

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1327.2/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/critical-cisco-ip-phone-rce-flaw/154864/

Trust: 0.1

sources: ZDI: ZDI-20-539 // VULHUB: VHN-181364 // VULMON: CVE-2020-3239 // JVNDB: JVNDB-2020-004410 // CNNVD: CNNVD-202004-1107 // NVD: CVE-2020-3239

CREDITS

Steven Seeley (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-20-539

SOURCES

db:ZDIid:ZDI-20-539
db:VULHUBid:VHN-181364
db:VULMONid:CVE-2020-3239
db:JVNDBid:JVNDB-2020-004410
db:CNNVDid:CNNVD-202004-1107
db:NVDid:CVE-2020-3239

LAST UPDATE DATE

2024-11-23T21:51:34.573000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-539date:2020-04-16T00:00:00
db:VULHUBid:VHN-181364date:2020-04-21T00:00:00
db:VULMONid:CVE-2020-3239date:2020-04-21T00:00:00
db:JVNDBid:JVNDB-2020-004410date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1107date:2020-04-26T00:00:00
db:NVDid:CVE-2020-3239date:2024-11-21T05:30:38.113

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-539date:2020-04-16T00:00:00
db:VULHUBid:VHN-181364date:2020-04-15T00:00:00
db:VULMONid:CVE-2020-3239date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2020-004410date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1107date:2020-04-15T00:00:00
db:NVDid:CVE-2020-3239date:2020-04-15T21:15:35.403