ID

VAR-202004-1250


CVE

CVE-2020-3250


TITLE

Cisco UCS Director and Cisco UCS Director Express for Big Data Vulnerability related to authority management in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004413

DESCRIPTION

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be put into a state. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the userAPIDownloadFile API, which calls the downloadFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose file contents in the context of root. Cisco UCS Director is a heterogeneous platform for Private Cloud Infrastructure as a Service (IaaS). A remote attacker could exploit this vulnerability by sending a request to a REST API endpoint to cause a denial of service

Trust: 2.34

sources: NVD: CVE-2020-3250 // JVNDB: JVNDB-2020-004413 // ZDI: ZDI-20-538 // VULHUB: VHN-181375

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 1.5

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:lteversion:3.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.4

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.3

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

sources: ZDI: ZDI-20-538 // JVNDB: JVNDB-2020-004413 // NVD: CVE-2020-3250

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3250
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3250
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-004413
value: CRITICAL

Trust: 0.8

ZDI: CVE-2020-3250
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202004-1113
value: HIGH

Trust: 0.6

VULHUB: VHN-181375
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-3250
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-004413
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181375
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3250
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3250
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004413
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-3250
baseSeverity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-538 // VULHUB: VHN-181375 // JVNDB: JVNDB-2020-004413 // CNNVD: CNNVD-202004-1113 // NVD: CVE-2020-3250 // NVD: CVE-2020-3250

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.9

problemtype:CWE-20

Trust: 1.0

sources: VULHUB: VHN-181375 // JVNDB: JVNDB-2020-004413 // NVD: CVE-2020-3250

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1113

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202004-1113

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004413

PATCH

title:cisco-sa-ucsd-mult-vulns-UNfpdW4Eurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 1.5

title:Cisco UCS Director and Cisco UCS Director Express for Big Data Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116014

Trust: 0.6

sources: ZDI: ZDI-20-538 // JVNDB: JVNDB-2020-004413 // CNNVD: CNNVD-202004-1113

EXTERNAL IDS

db:NVDid:CVE-2020-3250

Trust: 3.2

db:ZDIid:ZDI-20-538

Trust: 2.4

db:PACKETSTORMid:157955

Trust: 1.1

db:JVNDBid:JVNDB-2020-004413

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9557

Trust: 0.7

db:CNNVDid:CNNVD-202004-1113

Trust: 0.7

db:AUSCERTid:ESB-2020.1327

Trust: 0.6

db:VULHUBid:VHN-181375

Trust: 0.1

sources: ZDI: ZDI-20-538 // VULHUB: VHN-181375 // JVNDB: JVNDB-2020-004413 // CNNVD: CNNVD-202004-1113 // NVD: CVE-2020-3250

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ucsd-mult-vulns-unfpdw4e

Trust: 2.4

url:https://www.zerodayinitiative.com/advisories/zdi-20-538/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-3250

Trust: 1.4

url:http://packetstormsecurity.com/files/157955/cisco-ucs-director-cloupia-script-remote-code-execution.html

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3250

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1327/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ucs-director-multiple-vulnerabilities-via-rest-api-32042

Trust: 0.6

sources: ZDI: ZDI-20-538 // VULHUB: VHN-181375 // JVNDB: JVNDB-2020-004413 // CNNVD: CNNVD-202004-1113 // NVD: CVE-2020-3250

CREDITS

Steven Seeley (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-20-538

SOURCES

db:ZDIid:ZDI-20-538
db:VULHUBid:VHN-181375
db:JVNDBid:JVNDB-2020-004413
db:CNNVDid:CNNVD-202004-1113
db:NVDid:CVE-2020-3250

LAST UPDATE DATE

2024-11-23T21:51:34.746000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-538date:2020-04-16T00:00:00
db:VULHUBid:VHN-181375date:2020-06-05T00:00:00
db:JVNDBid:JVNDB-2020-004413date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1113date:2020-04-21T00:00:00
db:NVDid:CVE-2020-3250date:2024-11-21T05:30:39.420

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-538date:2020-04-16T00:00:00
db:VULHUBid:VHN-181375date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2020-004413date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1113date:2020-04-15T00:00:00
db:NVDid:CVE-2020-3250date:2020-04-15T21:15:35.777