CVE-2015-6347

The Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and create a dashboard or portlet, by visiting an unspecified web page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:secure_access_control_server:5.7.0.15:*:*:*:*:*:*:*

History

21 Nov 2024, 02:34

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac - Vendor Advisory
References () http://www.securitytracker.com/id/1033971 - () http://www.securitytracker.com/id/1033971 -

Information

Published : 2015-10-30 10:59

Updated : 2024-11-21 02:34


NVD link : CVE-2015-6347

Mitre link : CVE-2015-6347

CVE.ORG link : CVE-2015-6347


JSON object : View

Products Affected

cisco

  • secure_access_control_server
CWE
CWE-264

Permissions, Privileges, and Access Controls