SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Cisco Data Center Network Manager Vendors:   Cisco
Cisco Data Center Network Manager Lets Remote Authenticated Users Traverse the Directory to Create or View Files on the Target System
SecurityTracker Alert ID:  1041585
SecurityTracker URL:  http://securitytracker.com/id/1041585
CVE Reference:   CVE-2018-0464   (Links to External Site)
Date:  Aug 30 2018
Impact:   Disclosure of system information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 11.0(1)
Description:   A vulnerability was reported in Cisco Data Center Network Manager. A remote authenticated user can create or view files on the target system.

The management interface does not properly validate user-supplied input. A remote authenticated user can supply a specially crafted request to create or view files on target system that are located outside of the document directory.

The vendor has assigned bug ID CSCvj86072 to this vulnerability.

Tenable, Inc. reported this vulnerability.

Impact:   A remote authenticated user can create or view files on the target system.
Solution:   The vendor has issued a fix (11.0(1)).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Enterprise), Windows (2008)

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC