10
CVSSv2

CVE-2013-5486

Published: 23/09/2013 Updated: 16/09/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Directory traversal vulnerability in processImageSave.jsp in DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) prior to 6.2(1) allows remote malicious users to write arbitrary files via the chartid parameter, aka Bug IDs CSCue77035 and CSCue77036. NOTE: this can be leveraged to execute arbitrary commands by using the JBoss autodeploy functionality.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco prime data center network manager 5.0\\(3\\)

cisco prime data center network manager 5.0\\(2\\)

cisco prime data center network manager 4.2\\(3\\)

cisco prime data center network manager 4.2\\(1\\)

cisco prime data center network manager 4.1\\(5\\)

cisco prime data center network manager 5.2\\(2e\\)

cisco prime data center network manager 5.2\\(2c\\)

cisco prime data center network manager 5.2\\(2b\\)

cisco prime data center network manager 5.2\\(2a\\)

cisco prime data center network manager 6.1\\(1b\\)

cisco prime data center network manager 5.1\\(3u\\)

cisco prime data center network manager 5.1\\(1\\)

cisco prime data center network manager 4.1\\(3\\)

cisco prime data center network manager 6.1\\(1a\\)

cisco prime data center network manager 5.2\\(2\\)

cisco prime data center network manager 5.1\\(2\\)

cisco prime data center network manager 4.1\\(4\\)

cisco prime data center network manager 4.1\\(2\\)

cisco prime data center network manager

Vendor Advisories

Cisco Prime Data Center Network Manager (DCNM) contains multiple vulnerabilities that could allow an unauthenticated, remote attacker to disclose file components, and access text files on an affected device Various components of Cisco Prime DCNM are affected These vulnerabilities can be exploited independently on the same device; however, a rele ...

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super(upda ...