SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Unified Computing System Vendors:   Cisco
Cisco UCS Central Software Input Validation Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1032267
SecurityTracker URL:  http://securitytracker.com/id/1032267
CVE Reference:   CVE-2015-0701   (Links to External Site)
Date:  May 6 2015
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): UCS Central 1.2 and prior
Description:   A vulnerability was reported in Cisco UCS Central Software. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted HTTP request to trigger an input validation flaw and execute arbitrary operating system commands on the target device. The commands will run with root privileges.

The vendor has assigned bug ID CSCut46961 to this vulnerability.

Impact:   A remote user can execute arbitrary commands on the target device with root privileges.
Solution:   The vendor has issued a fix (1.3(1a)).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability

Advisory ID: cisco-sa-20150506-ucsc

Revision 1.0

For Public Release 2015 May 6 16:00 UTC (GMT)

+----------------------------------------------------------------------

Summary
=======

A vulnerability in the web framework of Cisco UCS Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device.

The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=8KjF
-----END PGP SIGNATURE-----
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC