A vulnerability in the AutoIT service of Cisco Ultra Services Framework Staging Server could allow an unauthenticated, remote attacker to execute arbitrary shell commands as the Linux root user. The vulnerability is due to improper shell invocations. An attacker could exploit this vulnerability by crafting CLI command inputs to execute Linux shell commands as the root user. This vulnerability affects all releases of Cisco Ultra Services Framework Staging Server prior to Releases 5.0.3 and 5.1. Cisco Bug IDs: CSCvc76673.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99436 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3 | Vendor Advisory |
http://www.securityfocus.com/bid/99436 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/99436 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3 - Vendor Advisory |
Information
Published : 2017-07-06 00:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6714
Mitre link : CVE-2017-6714
CVE.ORG link : CVE-2017-6714
JSON object : View
Products Affected
cisco
- ultra_services_framework_staging_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')