A vulnerability in the ImageID parameter of Cisco Unity Connection 10.5(2) could allow an unauthenticated, remote attacker to access files in arbitrary locations on the filesystem of an affected device. The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. Cisco Bug IDs: CSCvd90118.
References
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98286 - Broken Link | |
References | () http://www.securitytracker.com/id/1038400 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cuc - Vendor Advisory |
Information
Published : 2017-05-03 21:59
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6629
Mitre link : CVE-2017-6629
CVE.ORG link : CVE-2017-6629
JSON object : View
Products Affected
cisco
- unity_connection
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')