SB2020081914 - Multiple vulnerabilities in Cisco Data Center Network Manager
Published: August 19, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Stored Cross-site scripting (CVE-ID: CVE-2020-3439)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2020-3518)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2020-3523)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Path traversal (CVE-ID: CVE-2020-3519)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software . A remote attacker can send a specially crafted HTTP request and overwrite arbitrary files on the affected device.
5) Input validation error (CVE-ID: CVE-2020-3538)
The vulnerability allows a remote user to list or overwrite files on the device.
The vulnerability exists due to insufficient validation of user-supplied input in a certain REST API endpoint of Cisco Data Center Network Manager (DCNM) Software. A remote user can send a specially crafted HTTP request to the system and list of overwrite arbitrary files on the system.
6) Improper Authorization (CVE-ID: CVE-2020-3540)
The vulnerability allows a remote user to gain access to otherwise restricted functionality.
The vulnerability exists due to insufficient authorization checks in the web-based management interface of Cisco Data Center Network Manager (DCNM). A remote authenticated user can gain access to administrative functionality and view, modify, and delete data without proper authorization.
7) Improper Authorization (CVE-ID: CVE-2020-3539)
The vulnerability allows a remote user to gain access to otherwise restricted functionality.
The vulnerability exists due to insufficient authorization checks in the web-based management interface of Cisco Data Center Network Manager (DCNM). A remote authenticated user can gain access to administrative functionality and view, modify, and delete data without proper authorization.
8) Improper access control (CVE-ID: CVE-2020-3522)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote user can bypass implemented security restrictions and access resources that are intended for administrators only.
9) Information disclosure (CVE-ID: CVE-2020-3520)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A local user can gain unauthorized access to sensitive information on the system.
10) Path traversal (CVE-ID: CVE-2020-3521)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in a specific REST API of Cisco Data Center Network Manager (DCNM) Software. A remote authenticated user can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-stored-w4rJZJtO
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-JnHSWG5C
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-5TdMJRB3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-patrav-pW9RkhyW
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-pa-trav-bMdfSTTq
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-auth-mVDR6ygT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-YVJzqgk2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-MYeFpFcF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-infordisc-DOAXVvFV
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-file-path-6PKONjHe