SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Prime Infrastructure Vendors:   Cisco
Cisco Prime Infrastructure XML External Entity Processing Bug Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1038750
SecurityTracker URL:  http://securitytracker.com/id/1038750
CVE Reference:   CVE-2017-6662   (Links to External Site)
Date:  Jun 21 2017
Impact:   Disclosure of system information, Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.1 - 3.1.6
Description:   A vulnerability was reported in Cisco Prime Infrastructure. A remote authenticated user can read and write files and execute arbitrary code on the target system.

A remote authenticated user can supply specially crafted XML External Entity (XXE) data to read and write files and execute arbitrary code on the target system.

The vendor has assigned bug ID CSCvc23894 to this vulnerability.

Pichaya Morimoto from the SEC Consult Vulnerability Lab reported this vulnerability.

Impact:   A remote authenticated user can read and write files and execute arbitrary code on the target system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm1

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm1 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-piepnm1

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC