#VU26986 Path Traversal in Cisco UCS Director and Cisco UCS Director Express for Big Data


Published: 2020-10-27

Vulnerability identifier: #VU26986

Vulnerability risk: High

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-3247

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Cisco UCS Director
Server applications / Other server solutions
Cisco UCS Director Express for Big Data
Server applications / Other server solutions

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the REST API . A remote authenticated attacker can send a specially crafted file and write or execute arbitrary files on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Cisco UCS Director: 6.0.0.0 - 6.7.3.0

Cisco UCS Director Express for Big Data: 3.7.3.0


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability