VAR-201205-0021

Vulnerability from variot - Updated: 2023-12-18 14:02

The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807. The problem is Bug ID CSCtq86807 It is a problem.By a remotely authenticated user webnms/Temp/ Any subordinate file may be read. An attacker can exploit this issue to view arbitrary files in the context of the affected application. This may aid in further attacks. Cisco Wireless Control System (WCS) 7.0 through versions prior to 7.0.230.0 are vulnerable. This issue is being tracked by Cisco Bug ID CSCtq86807

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0021",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0.230.0"
      },
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0.172.0"
      },
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0.220.0"
      },
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0.164.3"
      },
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "7.0.164.0"
      },
      {
        "model": "wireless control system software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "7.0"
      },
      {
        "model": "wireless control system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.0.164"
      },
      {
        "model": "wireless control system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "7.0.163"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "55126"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wireless_control_system_software:7.0.172.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wireless_control_system_software:7.0.220.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wireless_control_system_software:7.0.230.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by vendor.",
    "sources": [
      {
        "db": "BID",
        "id": "55126"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-4014",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2011-4014",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-51959",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-4014",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201205-044",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-51959",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2011-4014",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807. The problem is Bug ID CSCtq86807 It is a problem.By a remotely authenticated user webnms/Temp/ Any subordinate file may be read. \nAn attacker can exploit this issue to view arbitrary files in the context of the affected application. This may aid in further attacks. \nCisco Wireless Control System (WCS) 7.0 through versions prior to 7.0.230.0 are vulnerable. \nThis issue is being tracked by Cisco Bug ID CSCtq86807",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "BID",
        "id": "55126"
      },
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-4014",
        "trust": 2.9
      },
      {
        "db": "SECTRACK",
        "id": "1027011",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "55126",
        "trust": 0.5
      },
      {
        "db": "VULHUB",
        "id": "VHN-51959",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "db": "BID",
        "id": "55126"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "id": "VAR-201205-0021",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T14:02:07.931000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release Notes for Cisco Wireless Control System for Windows or Linux, Release 7.0.230.0",
        "trust": 0.8,
        "url": "http://www.cisco.com/en/us/docs/wireless/wcs/release/notes/wcs_rn7_0_230.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://www.cisco.com/en/us/docs/wireless/wcs/release/notes/wcs_rn7_0_230.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id?1027011"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4014"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4014"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/en/us/products/ps6305/index.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/200.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/55126"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "db": "BID",
        "id": "55126"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "db": "BID",
        "id": "55126"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "date": "2012-05-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "date": "2012-05-05T00:00:00",
        "db": "BID",
        "id": "55126"
      },
      {
        "date": "2012-05-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "date": "2012-05-02T10:09:21.753000",
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "date": "2012-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-08-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-51959"
      },
      {
        "date": "2012-08-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2011-4014"
      },
      {
        "date": "2015-03-19T08:12:00",
        "db": "BID",
        "id": "55126"
      },
      {
        "date": "2012-05-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      },
      {
        "date": "2012-08-19T03:38:39.347000",
        "db": "NVD",
        "id": "CVE-2011-4014"
      },
      {
        "date": "2012-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco WCS of  TAC Case Attachment Vulnerability in reading arbitrary files in the tool",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002222"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-044"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…