755
VMScore

CVE-2018-15379

Published: 05/10/2018 Updated: 09/10/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions could allow an unauthenticated, remote malicious user to upload an arbitrary file. This file could allow the malicious user to execute commands at the privilege level of the user prime. This user does not have administrative or root privileges. The vulnerability is due to an incorrect permission setting for important system directories. An attacker could exploit this vulnerability by uploading a malicious file by using TFTP, which can be accessed via the web-interface GUI. A successful exploit could allow the malicious user to run commands on the targeted application without authentication.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco prime infrastructure 3.4\\(0.0\\)

cisco prime infrastructure 3.5\\(0.0\\)

cisco prime infrastructure 3.2\\(0.0\\)

cisco prime infrastructure 3.2\\(2.0\\)

cisco prime infrastructure 3.2

cisco prime infrastructure 3.3

cisco prime infrastructure 3.4

cisco prime infrastructure 3.2\\(1.0\\)

cisco prime infrastructure 3.3\\(0.0\\)

Vendor Advisories

A vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions could allow an unauthenticated, remote attacker to upload an arbitrary file This file could allow the attacker to execute commands at the privilege level of the user prime This user does not have administrative or root privilege ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info = {}) ...