CVE-2011-0364
Cisco Security Agent Management st_upload Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Management Console (webagent.exe) in Cisco Security Agent 5.1, 5.2, and 6.0 before 6.0.2.145 allows remote attackers to create arbitrary files and execute arbitrary code via unspecified parameters in a crafted st_upload request.
La consola de administración (webagent.exe) en Cisco Security Agent v5.1, v5.2 y v6.0 antes de v6.0.2.145 permite a atacantes remotos crear ficheros arbitrarios y ejecutar código de su elección a través de parámetros no especificados en una petición st_upload debidamente modificada.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Security Agent Management Console. Authentication is not required to exploit this vulnerability.
The flaw exists within the webagent.exe component which is handed requests by an Apache instance that listens by default on TCP port 443. When handling an st_upload request the process does not properly validate POST parameters used for a file creation. The contents of this newly created file are controllable via another POST variable. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-01-07 CVE Reserved
- 2011-02-16 CVE Published
- 2011-04-12 First Exploit
- 2023-10-09 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/8095 | Third Party Advisory | |
http://securityreason.com/securityalert/8197 | Third Party Advisory | |
http://securityreason.com/securityalert/8205 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/516505/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46420 | Vdb Entry | |
http://www.securitytracker.com/id?1025088 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-088 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65436 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/17155 | 2011-04-12 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43383 | 2018-10-10 | |
http://secunia.com/advisories/43393 | 2018-10-10 | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6cee6.shtml | 2018-10-10 | |
http://www.vupen.com/english/advisories/2011/0424 | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Security Agent Search vendor "Cisco" for product "Security Agent" | 5.1 Search vendor "Cisco" for product "Security Agent" and version "5.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Agent Search vendor "Cisco" for product "Security Agent" | 5.2 Search vendor "Cisco" for product "Security Agent" and version "5.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Security Agent Search vendor "Cisco" for product "Security Agent" | 6.0 Search vendor "Cisco" for product "Security Agent" and version "6.0" | - |
Affected
|