SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Hosted Collaboration Solution Vendors:   Cisco
(Cisco Issues Fix for Cisco Hosted Collaboration Solution for Contact Center) Apache Struts Jakarata Multipart Parser Bug Lets Remote Users Execute Arbitrary Commands on the Target System
SecurityTracker Alert ID:  1038088
SecurityTracker URL:  http://securitytracker.com/id/1038088
CVE Reference:   CVE-2017-5638   (Links to External Site)
Date:  Mar 21 2017
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in Apache Struts. A remote user can execute arbitrary commands on the target system. Cisco Hosted Collaboration Solution for Contact Center is affected.

A remote user can supply specially crafted Content-Type data to exploit a flaw in the Jakarta multipart parser and execute arbitrary operating system commands on the target system.

Nike Zheng reported this vulnerability.

Impact:   A remote user can execute arbitrary operating system commands on the target system.
Solution:   Cisco has issued a fix for Cisco Hosted Collaboration Solution for Contact Center.

A patch for 10.5(3) is available.

A patch for 10.0(2) is planned for March 24, 2017.

A patch for 11.0(2) is planned for March 22, 2017.

A patch for 11.5(1) is planned for March 22, 2017.

The Cisco advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170310-struts2

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170310-struts2 (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Mar 9 2017 Apache Struts Jakarata Multipart Parser Bug Lets Remote Users Execute Arbitrary Commands on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC