Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerability


Description   (#A directory traversal vulnerability has been reported in the web interface of Cisco Unified Communications Manager.#A remote authenticated attacker could exploit it to obtain an arbitrary file via a specially formed HTTP request.#Updated, 07/12/2016:#This vulnerability is exploitable via the "fileName" parameter of the "ccmadmin/bulkvivewfilecontents.do?filetype=samplefile" web page.##A proof of concept is available.)
     
Vulnerable Products   Vulnerable OS:
Unified Communications Manager (Cisco) - 7.0, 7.0(1), 7.0(2), 7.1, 7.1(3), ..., 8.6, 9.0, 9.0.1, 9.1, 9.1(1)
     
Solution   Versions 9.1.2, 10.5.2 and 11.5 of Unified Communications Manager fix this vulnerability.
     
CVE   CVE-2013-5528
     
References   - Cisco : Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
- Cisco : Cisco Unified Communications Manager Administrative Web Interface Directory Traversal Vulnerability
http://tools.cisco.com/security/center/viewAlert.x?alertId=31221
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2013-10-10 

 Target Type 
Server 

 Possible exploit 
Remote