Cisco Unified Computing System Director Input Validation Flaw in JSP Lets Remote Authenticated Users Overwrite Arbitrary Files on the Target System
SecurityTracker Alert ID: 1033451|
SecurityTracker URL: http://securitytracker.com/id/1033451
(Links to External Site)
Date: Sep 2 2015
Modification of system information, Modification of user information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): Director, prior to 126.96.36.199|
A vulnerability was reported in Cisco Unified Computing System Director. A remote authenticated user can overwrite files on the target system.|
A remote authenticated user can send specially crafted HTTP requests to trigger an input validation flaw in JavaServer Pages (JSP) and overwrite arbitrary files on the target system.
The vendor has assigned Cisco bug ID CSCus62625 to this vulnerability.
Cisco Integrated Management Controller (IMC) Supervisor is also affected.
A remote authenticated user can overwrite arbitrary files on the target system.|
The vendor has issued a fix (188.8.131.52).|
The vendor's advisory is available at:
Vendor URL: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150902-cimcs (Links to External Site)
Input validation error|
Source Message Contents
Subject: Cisco Security Advisory: Cisco Integrated Management Controller Supervisor and Cisco UCS Director Remote File Overwrite Vulnerability|
-----BEGIN PGP SIGNED MESSAGE-----
Cisco Security Advisory: Cisco Integrated Management Controller Supervisor and Cisco UCS Director Remote File Overwrite Vulnerability
Advisory ID: cisco-sa-20150902-cimcs
For Public Release 2015 September 2 16:00 UTC (GMT)
Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director contain a remote file overwrite vulnerability that could allow an unauthenticated, remote attacker to overwrite arbitrary system files, resulting in system instability or a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
-----END PGP SIGNATURE-----
cust-security-announce mailing list
To unsubscribe, send the command "unsubscribe" in the subject of your message to firstname.lastname@example.org