All the vulnerabilites related to cisco - unified_ccx
Vulnerability from fkie_nvd
Published
2009-07-16 15:30
Modified
2024-11-21 01:04
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | crs | 3.5 | |
cisco | crs | 4.0 | |
cisco | crs | 4.1 | |
cisco | crs | 4.5 | |
cisco | crs | 5.0 | |
cisco | crs | 6.0 | |
cisco | crs | 7.0 | |
cisco | customer_response_applications | 3.5 | |
cisco | ip_qm | 3.5 | |
cisco | unified_ccx | 3.5 | |
cisco | unified_ccx | 4.0\(1\) | |
cisco | unified_ccx | 4.0\(3\) | |
cisco | unified_ccx | 4.0\(4\) | |
cisco | unified_ccx | 4.0\(5\) | |
cisco | unified_ccx | 4.0\(5a\) | |
cisco | unified_ccx | 4.5\(1\) | |
cisco | unified_ccx | 4.5\(2\) | |
cisco | unified_ccx | 5.0\(1\) | |
cisco | unified_ccx | 6.0\(1\) | |
cisco | unified_ccx | 7.0\(1\) | |
cisco | unified_ip_contact_center_express | 3.0 | |
cisco | unified_ip_contact_center_express | 5.0\(1\) | |
cisco | unified_ip_contact_center_express | 6.0\(1\) | |
cisco | unified_ip_contact_center_express | 7.0 | |
cisco | unified_ip_ivr | 3.0 | |
cisco | unified_ip_ivr | 3.1 | |
cisco | unified_ip_ivr | 4.0 | |
cisco | unified_ip_ivr | 4.1 | |
cisco | unified_ip_ivr | 4.5 | |
cisco | unified_ip_ivr | 5.0 | |
cisco | unified_ip_ivr | 6.0 | |
cisco | unified_ip_ivr | 7.0 | |
cisco | unified_ip_ivr | 7.0\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:crs:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C6F8BA2-EA5E-4E90-8390-2D29E8FAB4AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E010B8C0-06BF-42C9-8AE6-8A0A6696EC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "98203DF7-2B21-4D7F-B32C-E9E6C24E1A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "629B1A0E-A13F-4209-B070-960392893299", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "13E6B9D0-5F88-4F48-A313-D478FB9919FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F979F18-29A6-433C-91A4-0042EC275CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F6008EC-FB15-43B3-8B09-3BFB28536EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:customer_response_applications:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B5DC9FD7-0716-456C-895F-74BC7866C520", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ip_qm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BC0CC96-C3DD-4564-8323-3EAB9ACBFF45", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AD62E8B9-9715-4217-864F-C54F1DEE835F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "32F36940-BF16-4C7C-A24C-D923AF333709", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2BE86CE-EF95-4841-B145-DFA4D0E0EF4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "369C0FF7-BC46-400E-AC61-F97BAFDE14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "6883E046-DA9D-4402-A22B-31140D6C8054", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED3C91A3-E343-4FAC-85D7-649C7ECE6E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "51E21F75-530E-4399-B8EC-1E933711D6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6273D50B-8D2B-4F5A-B4F3-2CC86F5B730F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:5.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB3F5DF8-E9A7-4812-8677-BDCE4679ED9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DBAF3470-5AF5-4B26-AA92-A92E908A52E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8CDC6A2-319F-4C83-8042-BEF6C9FD1C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA09955E-62F4-4098-8FFF-C61D33EB8AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:5.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EBA8057F-7E31-4F9D-992E-621DCD7C4089", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1568EE5B-716D-439B-9017-8498C9353B4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCFA9981-ED56-4D5B-AF82-1BCC551FE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "71082BE9-AF48-460A-9127-4D5D6DBA02F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDFDB400-1557-4A6D-A40F-00271A666A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E744A286-EA75-4E20-8503-12217FE0F03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4B5083B-0782-4668-B88A-A6DB65A4AFCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F3782F66-76E2-4912-AA16-CB552A8C4ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A26B5F10-147A-4C32-BE98-F24407E4973F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1E4FAEE-BE07-45D8-A7F4-92668CA9BF8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "73CA4024-4F80-466A-9383-9A68E2FAC995", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "53C79246-3D29-4A8E-94DD-8771964B7E4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados - XSS - en el interfaz de administraci\u00f3n en Cisco Customer Response Solutions (CRS) anteriores a v7.0(1) SR2 en el servidor Cisco Unified Contact Center Express (tambi\u00e9n conocido como CCX) permite a los usuarios remotos autenticado inyectar arbitrariamente una secuencia de comandos web o HTML en la base de datos CCX a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2009-2048", "lastModified": "2024-11-21T01:04:00.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-07-16T15:30:00.767", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/55937" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/35861" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/35705" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1022569" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/55937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-16 15:30
Modified
2024-11-21 01:04
Severity ?
Summary
Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | crs | 3.5 | |
cisco | crs | 4.0 | |
cisco | crs | 4.1 | |
cisco | crs | 4.5 | |
cisco | crs | 5.0 | |
cisco | crs | 6.0 | |
cisco | crs | 7.0 | |
cisco | customer_response_applications | 3.5 | |
cisco | ip_qm | 3.5 | |
cisco | unified_ccx | 3.5 | |
cisco | unified_ccx | 4.0\(1\) | |
cisco | unified_ccx | 4.0\(3\) | |
cisco | unified_ccx | 4.0\(4\) | |
cisco | unified_ccx | 4.0\(5\) | |
cisco | unified_ccx | 4.0\(5a\) | |
cisco | unified_ccx | 4.5\(1\) | |
cisco | unified_ccx | 4.5\(2\) | |
cisco | unified_ccx | 5.0\(1\) | |
cisco | unified_ccx | 6.0\(1\) | |
cisco | unified_ccx | 7.0\(1\) | |
cisco | unified_ip_contact_center_express | 3.0 | |
cisco | unified_ip_contact_center_express | 5.0\(1\) | |
cisco | unified_ip_contact_center_express | 6.0\(1\) | |
cisco | unified_ip_contact_center_express | 7.0 | |
cisco | unified_ip_ivr | 3.0 | |
cisco | unified_ip_ivr | 3.1 | |
cisco | unified_ip_ivr | 4.0 | |
cisco | unified_ip_ivr | 4.1 | |
cisco | unified_ip_ivr | 4.5 | |
cisco | unified_ip_ivr | 5.0 | |
cisco | unified_ip_ivr | 6.0 | |
cisco | unified_ip_ivr | 7.0 | |
cisco | unified_ip_ivr | 7.0\(1\) |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:crs:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C6F8BA2-EA5E-4E90-8390-2D29E8FAB4AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E010B8C0-06BF-42C9-8AE6-8A0A6696EC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "98203DF7-2B21-4D7F-B32C-E9E6C24E1A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "629B1A0E-A13F-4209-B070-960392893299", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "13E6B9D0-5F88-4F48-A313-D478FB9919FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F979F18-29A6-433C-91A4-0042EC275CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:crs:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F6008EC-FB15-43B3-8B09-3BFB28536EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:customer_response_applications:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "B5DC9FD7-0716-456C-895F-74BC7866C520", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ip_qm:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BC0CC96-C3DD-4564-8323-3EAB9ACBFF45", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AD62E8B9-9715-4217-864F-C54F1DEE835F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "32F36940-BF16-4C7C-A24C-D923AF333709", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2BE86CE-EF95-4841-B145-DFA4D0E0EF4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "369C0FF7-BC46-400E-AC61-F97BAFDE14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "6883E046-DA9D-4402-A22B-31140D6C8054", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.0\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED3C91A3-E343-4FAC-85D7-649C7ECE6E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "51E21F75-530E-4399-B8EC-1E933711D6E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:4.5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6273D50B-8D2B-4F5A-B4F3-2CC86F5B730F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:5.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB3F5DF8-E9A7-4812-8677-BDCE4679ED9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DBAF3470-5AF5-4B26-AA92-A92E908A52E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8CDC6A2-319F-4C83-8042-BEF6C9FD1C2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA09955E-62F4-4098-8FFF-C61D33EB8AB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:5.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EBA8057F-7E31-4F9D-992E-621DCD7C4089", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1568EE5B-716D-439B-9017-8498C9353B4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_contact_center_express:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCFA9981-ED56-4D5B-AF82-1BCC551FE02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "71082BE9-AF48-460A-9127-4D5D6DBA02F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDFDB400-1557-4A6D-A40F-00271A666A0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E744A286-EA75-4E20-8503-12217FE0F03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4B5083B-0782-4668-B88A-A6DB65A4AFCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F3782F66-76E2-4912-AA16-CB552A8C4ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A26B5F10-147A-4C32-BE98-F24407E4973F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1E4FAEE-BE07-45D8-A7F4-92668CA9BF8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "73CA4024-4F80-466A-9383-9A68E2FAC995", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "53C79246-3D29-4A8E-94DD-8771964B7E4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el interfaz de administraci\u00f3n en Cisco Customer Response Solutions (CRS) anteriores a v7.0(1) SR2 en el servidor Cisco Unified Contact Center Express (tambi\u00e9n conocido como CCX) permite a los usuarios remotos autenticados leer, modificar y borrar ficheros arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2009-2047", "lastModified": "2024-11-21T01:04:00.427", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-16T15:30:00.750", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/55936" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/35861" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35706" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1022569" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/55936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-27 21:55
Modified
2024-11-21 01:30
Severity ?
Summary
Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A0811D-F2CF-40FC-81D2-94A5ED94919B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8AC426E-23CD-482C-B685-74E878BAC6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "53C79246-3D29-4A8E-94DD-8771964B7E4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "42BEC70D-CF5E-4502-A8F4-4E33BD8211B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "342BA247-E04A-4A9A-BC7B-F517F59737A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "880CF3B2-091F-4D3C-8D92-67600C317F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_ip_ivr:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F55067A-877D-46F3-8125-8F19C221D90B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_ccx:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DBAF3470-5AF5-4B26-AA92-A92E908A52E4", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8CDC6A2-319F-4C83-8042-BEF6C9FD1C2B", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "947A904F-0C92-4ECF-9274-82B1F384E9F2", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7A63A8E-5C77-4FA9-BFCE-EDD840592D55", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "88373C07-1C93-46B4-8D46-9D790262764C", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_ccx:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9235568-323C-4060-8E7D-2CDC9C19DDAA", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2AF68FA-433F-46F2-B309-B60A108BECFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "640BFEE2-B364-411E-B641-7471B88ED7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1B9FDFF3-2E60-4E41-9251-93283D945D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1022C151-6EC8-4E8D-85ED-59D51551BDAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "060593BD-ADC1-4282-BC6D-E0D6A2B7C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "239510AD-8BB0-4515-B1DA-80DE696D25DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "26277C4A-4E27-492C-B18C-AC68D86ADF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9003EC1A-6E85-41F1-BB5D-B841C9C28105", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "0318CF61-B892-4D44-B41A-D630B4AB808C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "84A49932-1E22-4BE0-8195-926D44F65AAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DE1B0DD-EA64-493B-86B7-9057EE5033C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "00ECD7C0-7F3C-4021-B949-32141E58687C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E51D8BF-12BB-4DD1-9232-1D066889B30F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "48A8EE9A-458D-4619-B04D-F01A9934DC11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "FF3EB2A0-6907-4260-BBF1-D8E6E40827FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "44280E56-C151-4C08-804D-001F91FF2AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD968A56-9539-4699-9099-0F220D283CB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "E4CEBB9B-2B43-44C2-BC93-55E58C24CED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2597F4-9B5B-4E2E-8DA5-40D769CC57B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "665ACEFC-B989-42AB-BAB4-2C273CF2B702", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F9ABF04-C732-4509-8589-F58E1D5F66E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "0D899431-7C91-4CB4-9CBA-D5BA34B7B330", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FC13697F-84A3-4793-B82E-6E8857B4FC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "DC24D57B-3D0C-486D-83CB-A4E419CA9626", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "72C54A10-998C-435F-B058-A6879CD608A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "D81D69D5-E669-4DBC-A76B-E9C30A239A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "FCB47159-FA07-4317-B562-D7AB7C49E8F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "8765E016-7C6F-4C36-A22C-78ED8666F7E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "2B3D5254-3E67-452E-ADB3-204A66765952", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2a\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "9D3680AB-CEF8-4C2C-A46B-C9009E6A6590", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B591E75E-040C-4D26-AF13-A4F87E048579", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "F22B2CDE-DB49-402D-8BF2-B9458D907DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "18986D7E-E1E6-46EB-A247-2A98224FC122", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "BFAAC2E8-B548-4940-9492-DEAB574E7CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "46BDD926-7F96-46C5-AD9C-40B7D3C78340", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7BA63076-B8A1-4672-99F3-703F7838F3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "3EADE6FA-40F8-4BEB-ABDB-77D4C0E587BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "3F84676C-75A5-48D2-889D-B48EC724336F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EA15D48-A0DE-4091-8C78-666E98B488C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "3038823F-C32D-4C1B-8228-D14B35535297", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "617E82C3-1CB1-46B2-BCFE-94BF9DBDD1D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2ECDCE1A-176D-46E0-9C39-19FAD7B57892", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "C6856A2A-55F4-4785-BEC1-54295D7D9CD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "2727998A-ED1F-4EFE-9952-7DA8486706D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F61FD826-A08E-477C-AA57-359B10387035", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "7A9EDB91-350B-4ED4-A177-257023380C44", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "2CBA6140-CEF7-4990-9A1E-76F02607BA84", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF2F2A-DF52-4BD8-A56B-B4E91CD1D1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "248E4608-B870-4913-8048-3771685CBD77", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "52D7EECA-322E-48E4-9682-6C3C39B64B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "547E3100-EFBF-4F30-8D9E-81F8B79D9F9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BCE55716-ACB7-411B-B708-415D4DB1D8AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "916C8A47-B3DA-42C0-BE2F-041269F79CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C09FE52A-E0AF-4B0F-A44E-4362E26A88D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "A9AD0704-6F85-4E64-88D4-73E8BB2BEF4E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Cisco Unified Communications Manager (CUCM) v5.x y v6.x anterior v6.1(5)SU2, v7.x anterior v7.1(5b)SU2 y v8.x anterior v8.0(3), y Cisco Unified Contact Center Express (tambi\u00e9n conocido como Unified CCX o UCCX) y Cisco Unified IP Interactive Voice Response (Unified IP-IVR) anterior a v6.0(1)SR1ES8, v7.0(x) anterior a v7.0(2)ES1, v8.0(x) hasta v8.0(2)SU3, y v8.5(x) anterior a v8.5(1)SU2, permite a atacantes remotos leer ficheros arbitrarios mediante una URL especialmente dise\u00f1ada, tambi\u00e9n conocido como Bug IDs CSCth09343 y CSCts44049." } ], "id": "CVE-2011-3315", "lastModified": "2024-11-21T01:30:14.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-27T21:55:00.823", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2009-2047
Vulnerability from cvelistv5
Published
2009-07-16 15:00
Modified
2024-08-07 05:36
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1022569 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/35861 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/35706 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2009/1913 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51731 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml | vendor-advisory, x_refsource_CISCO | |
http://osvdb.org/55936 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:36:20.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022569", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022569" }, { "name": "35861", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35861" }, { "name": "35706", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35706" }, { "name": "ADV-2009-1913", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "unified-ccx-interface-directory-traversal(51731)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "name": "55936", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/55936" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1022569", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022569" }, { "name": "35861", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35861" }, { "name": "35706", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35706" }, { "name": "ADV-2009-1913", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "unified-ccx-interface-directory-traversal(51731)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "name": "55936", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/55936" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-2047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022569", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022569" }, { "name": "35861", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35861" }, { "name": "35706", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35706" }, { "name": "ADV-2009-1913", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "unified-ccx-interface-directory-traversal(51731)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" }, { "name": "55936", "refsource": "OSVDB", "url": "http://osvdb.org/55936" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-2047", "datePublished": "2009-07-16T15:00:00", "dateReserved": "2009-06-12T00:00:00", "dateUpdated": "2024-08-07T05:36:20.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3315
Vulnerability from cvelistv5
Published
2011-10-27 21:00
Modified
2024-09-17 02:31
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20111026 Cisco Unified Communications Manager Directory Traversal Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm" }, { "name": "20111026 Cisco Unified Contact Center Express Directory Traversal Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-27T21:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20111026 Cisco Unified Communications Manager Directory Traversal Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm" }, { "name": "20111026 Cisco Unified Contact Center Express Directory Traversal Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20111026 Cisco Unified Communications Manager Directory Traversal Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm" }, { "name": "20111026 Cisco Unified Contact Center Express Directory Traversal Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3315", "datePublished": "2011-10-27T21:00:00Z", "dateReserved": "2011-08-29T00:00:00Z", "dateUpdated": "2024-09-17T02:31:56.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2048
Vulnerability from cvelistv5
Published
2009-07-16 15:00
Modified
2024-08-07 05:36
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1022569 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51730 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/35861 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/55937 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2009/1913 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/35705 | vdb-entry, x_refsource_BID | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:36:20.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022569", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022569" }, { "name": "unified-ccx-interface-xss(51730)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730" }, { "name": "35861", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35861" }, { "name": "55937", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/55937" }, { "name": "ADV-2009-1913", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "35705", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35705" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1022569", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022569" }, { "name": "unified-ccx-interface-xss(51730)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730" }, { "name": "35861", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35861" }, { "name": "55937", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/55937" }, { "name": "ADV-2009-1913", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "35705", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35705" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-2048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022569", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022569" }, { "name": "unified-ccx-interface-xss(51730)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51730" }, { "name": "35861", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35861" }, { "name": "55937", "refsource": "OSVDB", "url": "http://osvdb.org/55937" }, { "name": "ADV-2009-1913", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1913" }, { "name": "35705", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35705" }, { "name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-2048", "datePublished": "2009-07-16T15:00:00", "dateReserved": "2009-06-12T00:00:00", "dateUpdated": "2024-08-07T05:36:20.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }