A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to execute arbitrary code. This vulnerability is due to insufficient sanitization of configuration entries. An attacker could exploit this vulnerability by logging in as a super admin and entering crafted input to configuration options on the CSPC configuration dashboard. A successful exploit could allow the attacker to execute remote code as root.
References
Configurations
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 4.7 |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-CIV-kDuBfNfu - Vendor Advisory |
Information
Published : 2021-06-04 17:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1538
Mitre link : CVE-2021-1538
CVE.ORG link : CVE-2021-1538
JSON object : View
Products Affected
cisco
- common_services_platform_collector
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')