Cisco Prime Infrastructure (PI) 1.4(0.45) and earlier, when AAA authentication is used, allows remote authenticated users to bypass intended access restrictions via a username with a modified composition of lowercase and uppercase characters, aka Bug ID CSum59958.
Monthly Archives: August 2015
CVE-2015-6256
Cisco ASR 5000 devices with software 19.0.M0.60828 allow remote attackers to cause a denial of service (OSPF process restart) via crafted length fields in headers of OSPF packets, aka Bug ID CSCuv62820.
CVE-2015-6258
The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033.
up.time 7.5.0 Arbitrary File Disclose / Delete
Input passed to the ‘file_name’ parameter in ‘get2post.php’ script is not properly sanitised before being used to get the contents of a resource and delete files. This can be exploited to read and delete arbitrary data from local resources with the permissions of the web server using a proxy tool.
up.time 7.5.0 Upload / Execute File
up.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, privilege escalation, arbitrary text file creation, and renaming that file to php you can execute system commands with SYSTEM privileges.
up.time 7.5.0 Superadmin Privilege Escalation
up.time suffers from a privilege escalation issue. A normal user can elevate his/her privileges by sending a POST request setting the parameter ‘userroleid’ to 1. Cross site request forgery can be used to exploit this attack.
up.time 7.5.0 Cross Site Request Forgery / Cross Site Scripting
up.time version 7.5.0 allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Multiple cross site scripting vulnerabilities were also discovered. The issue is triggered when input passed via the multiple parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
SiteFactory CMS 5.5.9 Directory Traversal
SiteFactory CMS version 5.5.9 suffers from a directory traversal vulnerability.
Apache Flex BlazeDS 4.7.0 XML Entity Expansion
When receiving XML encoded AMF messages containing DTD entities, the default XML parser configurations allows expanding of entities to local resources. A request that included a specially crafted request parameter could be used to access content that would otherwise be protected.
EMC Documentum D2 Fail Open
EMC Documentum D2 contains fail open vulnerability that could be exploited by malicious users to compromise D2. Versions 4.2 and below are affected.