Wednesday, December 7, 2016

Cisco Emergency Responder Directory Traversal Vulnerability

A vulnerability in the File Management Utility, the Download File form, and the Serviceability application of Cisco Emergency Responder could allow an authenticated, remote attacker to access files in arbitrary locations on the file system of an affected device.

The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgV4I5 A vulnerability in the File Management Utility, the Download File form, and the Serviceability application of Cisco Emergency Responder could allow an authenticated, remote attacker to access files in arbitrary locations on the file system of an affected device.

The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2hgV4I5
Security Impact Rating: Medium
CVE: CVE-2016-9208

from Cisco Security Advisory http://ift.tt/2hgV4I5

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.