A vulnerability in the web interface of Cisco License Manager software could allow an unauthenticated, remote attacker to download and view files within the application that should be restricted, aka Directory Traversal. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. An exploit could allow the attacker to view application files that may contain sensitive information. Cisco Bug IDs: CSCvd83577.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101169 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-clm | Vendor Advisory |
http://www.securityfocus.com/bid/101169 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-clm | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101169 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-clm - Vendor Advisory |
Information
Published : 2017-10-05 07:29
Updated : 2024-11-21 03:09
NVD link : CVE-2017-12263
Mitre link : CVE-2017-12263
CVE.ORG link : CVE-2017-12263
JSON object : View
Products Affected
cisco
- license_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')