// For flags

CVE-2017-6637

Cisco Prime Collaboration Provisioning logconfigtracer Directory Traversal Arbitrary File Deletion Vulnerability

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web interface of Cisco Prime Collaboration Provisioning Software (prior to Release 11.1) could allow an authenticated, remote attacker to delete any file from an affected system. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests and fails to apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request that uses directory traversal techniques to submit a path to a desired file location on an affected system. A successful exploit could allow the attacker to delete any file from the system. Cisco Bug IDs: CSCvc99618.

Una vulnerabilidad en la interfaz web de Prime Collaboration Provisioning Software de Cisco (versiones anteriores a 11.1) podría permitir a un atacante remoto autenticado eliminar cualquier archivo de un sistema afectado. La vulnerabilidad se presenta porque el programa afectado no realiza la comprobación de entrada apropiada de las peticiones HTTP y no aplica los controles de acceso basados en roles (RBAC) a las URL HTTP pedidas. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada que utiliza técnicas de salto de directorio para enviar una ruta (path) a la ubicación de archivo deseada en un sistema afectado. Una explotación con éxito podría permitir al atacante eliminar cualquier archivo del sistema. IDs de Bug de Cisco: CSCvc99618.

This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Cisco Prime Collaboration Provisioning. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the logconfigtracer.jsp page, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete any files accessible to the root user.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-03-09 CVE Reserved
  • 2017-05-22 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-11-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
9.0.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "9.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
9.5.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "9.5.0"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
10.0.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "10.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
10.5.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "10.5.0"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
10.5.1
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "10.5.1"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
10.6.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "10.6.0"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
10.6.2
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "10.6.2"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
11.0.0
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "11.0.0"
-
Affected