CVE-2013-3443

The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.25:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.0.27:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.1:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.1:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.1:c:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.1:d:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.3:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.3:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:c:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:d:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:e:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:f:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.5:g:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.7:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.1.7:b:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.2.3:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.2.3:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.2.3:c:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.3.5:a:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.3:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.3:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.3:c:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.5:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.5:b:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.5:c:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.5:d:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:4.4.7:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.0.3:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.0.3:c:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.0.3:d:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:cisco:wide_area_application_services:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.1.1:a:*:*:*:*:*:*
cpe:2.3:a:cisco:wide_area_application_services:5.1.1:b:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:a:cisco:wide_area_application_services:5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://osvdb.org/95877 - () http://osvdb.org/95877 -
References () http://secunia.com/advisories/54367 - () http://secunia.com/advisories/54367 -
References () http://secunia.com/advisories/54372 - () http://secunia.com/advisories/54372 -
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm - Vendor Advisory
References () http://www.securityfocus.com/bid/61542 - () http://www.securityfocus.com/bid/61542 -
References () http://www.securitytracker.com/id/1028851 - () http://www.securitytracker.com/id/1028851 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/86121 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/86121 -

Information

Published : 2013-08-01 13:32

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3443

Mitre link : CVE-2013-3443

CVE.ORG link : CVE-2013-3443


JSON object : View

Products Affected

cisco

  • wide_area_application_services
CWE
CWE-20

Improper Input Validation