CVE-2020-3383 – Cisco Data Center Network Manager Path Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2020-3383
A vulnerability in the archive utility of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to a lack of proper input validation of paths that are embedded within archive files. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to write arbitrary files in the system with the privileges of the logged-in user. Una vulnerabilidad en la utilidad de archivo de Cisco Data Center Network Manager (DCNM), podría permitir a un atacante remoto autenticado dirigir ataques de salto de directorio en un dispositivo afectado. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-3384 – Cisco Data Center Network Manager Command Injection Vulnerability
https://notcve.org/view.php?id=CVE-2020-3384
A vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to inject arbitrary commands on the underlying operating system. Una vulnerabilidad en los endpoints específicos de la API REST de Cisco Data Center Network Manager (DCNM), podría permitir a un atacante remoto autenticado inyectar comandos arbitrarios en el sistema operativo subyacente con los privilegios del usuario registrado. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-rest-inj-BCt8pwAJ • CWE-184: Incomplete List of Disallowed Inputs •
CVE-2020-3386 – Cisco Data Center Network Manager Improper Authorization Vulnerability
https://notcve.org/view.php?id=CVE-2020-3386
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges. Una vulnerabilidad en el endpoint API REST de Cisco Data Center Network Manager (DCNM), podría permitir a un atacante remoto autenticado con una cuenta poco privilegiada omitir la autorización en la API de un dispositivo afectado. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •
CVE-2020-3460 – Cisco Data Center Network Manager Cross-Site Scripting Vulnerability
https://notcve.org/view.php?id=CVE-2020-3460
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by intercepting a request from a user and injecting malicious data into an HTTP header. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. Una vulnerabilidad en la interfaz de administración basada en web de Cisco Data Center Network Manager (DCNM), podría permitir a un atacante remoto no autenticado dirigir un ataque de tipo cross-site scripting (XSS) contra un usuario de la interfaz. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-3jkDLsLV • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-3380 – Cisco Data Center Network Manager Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-3380
A vulnerability in the CLI of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by authenticating as the fmserver user and submitting malicious input to a specific command. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. Una vulnerabilidad en la CLI de Cisco Data Center Network Manager (DCNM) podría permitir a un atacante local autenticado elevar los privilegios a root y ejecutar comandos arbitrarios en el sistema operativo subyacente. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-privescal-zxfCH7Dg • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •