CVE-2011-2547 (GCVE-0-2011-2547)
Vulnerability from cvelistv5 – Published: 2011-07-28 22:00 – Updated: 2024-08-06 23:08
VLAI?
Summary
The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:22.904Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "45355",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45355"
},
{
"name": "cisco-sa500-interface-command-exec(68738)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68738"
},
{
"name": "20110720 Cisco SA 500 Series Security Appliances Web Management Interface Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml"
},
{
"name": "1025810",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1025810"
},
{
"name": "48810",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48810"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "45355",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45355"
},
{
"name": "cisco-sa500-interface-command-exec(68738)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68738"
},
{
"name": "20110720 Cisco SA 500 Series Security Appliances Web Management Interface Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml"
},
{
"name": "1025810",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1025810"
},
{
"name": "48810",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48810"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-2547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "45355",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45355"
},
{
"name": "cisco-sa500-interface-command-exec(68738)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68738"
},
{
"name": "20110720 Cisco SA 500 Series Security Appliances Web Management Interface Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml"
},
{
"name": "1025810",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025810"
},
{
"name": "48810",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48810"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-2547",
"datePublished": "2011-07-28T22:00:00",
"dateReserved": "2011-06-27T00:00:00",
"dateUpdated": "2024-08-06T23:08:22.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.1.18\", \"matchCriteriaId\": \"F34CEB78-9F68-4BF7-BB70-7AF03524CA9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"988B2905-DE56-417F-BDFC-26C3120F4FE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1DCFEE-D2CA-46EC-B92B-7BC6D84A863F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6969B8E-BA94-4E5C-8864-886EC7DB5568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.0.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F3EFD6F-BCA3-4578-ACB7-CDA48C66F8A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8D0F427-03DB-4B77-AD44-2CF30A3A8468\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.1.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D1CC976-BE22-4C5B-A877-ED78544C2730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:sa500_software:1.1.65:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE089465-47D4-48EC-878A-B045E78A6D7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:sa520:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41EA22A9-7330-473D-A8F6-625EACF21B35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:sa520w:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7A7463-BCAC-4DD8-920A-2D3134D3B579\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:sa540:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86F2ED99-EB36-4FB6-8404-BF0DDD2B2AEA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681.\"}, {\"lang\": \"es\", \"value\": \"La interfaz de gesti\\u00f3n basada en la web aplicativos de seguridad de Cisco SA 500 ??Series con el software anterior a v2.1.19 permite a usuarios remotos autenticados ejecutar c\\u00f3digo de su elecci\\u00f3n a trav\\u00e9s de los par\\u00e1metros manipulados en formularios web, tambi\\u00e9n conocido como Bug ID CSCtq65681.\"}]",
"id": "CVE-2011-2547",
"lastModified": "2024-11-21T01:28:30.200",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-07-28T22:55:02.140",
"references": "[{\"url\": \"http://secunia.com/advisories/45355\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1025810\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/48810\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68738\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/45355\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1025810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/48810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68738\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2547\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2011-07-28T22:55:02.140\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681.\"},{\"lang\":\"es\",\"value\":\"La interfaz de gesti\u00f3n basada en la web aplicativos de seguridad de Cisco SA 500 ??Series con el software anterior a v2.1.19 permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros manipulados en formularios web, tambi\u00e9n conocido como Bug ID CSCtq65681.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.1.18\",\"matchCriteriaId\":\"F34CEB78-9F68-4BF7-BB70-7AF03524CA9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988B2905-DE56-417F-BDFC-26C3120F4FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1DCFEE-D2CA-46EC-B92B-7BC6D84A863F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6969B8E-BA94-4E5C-8864-886EC7DB5568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3EFD6F-BCA3-4578-ACB7-CDA48C66F8A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D0F427-03DB-4B77-AD44-2CF30A3A8468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1CC976-BE22-4C5B-A877-ED78544C2730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:sa500_software:1.1.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE089465-47D4-48EC-878A-B045E78A6D7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:sa520:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EA22A9-7330-473D-A8F6-625EACF21B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:sa520w:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7A7463-BCAC-4DD8-920A-2D3134D3B579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:sa540:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F2ED99-EB36-4FB6-8404-BF0DDD2B2AEA\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/45355\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025810\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48810\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68738\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://secunia.com/advisories/45355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/48810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…