var-201308-0091
Vulnerability from variot
The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. plural Cisco Product Web Framework central management mode (central-management mode) Contains a vulnerability that allows arbitrary command execution. Vendors have confirmed this vulnerability Bug ID CSCug40609 , CSCug48855 , CSCug48921 , CSCug48872 , CSCuh21103 , CSCuh21020 ,and CSCug56790 It is released as.By a remotely authenticated user GUI An arbitrary command may be executed by adding a specially crafted string to the field value. Multiple Cisco Content Network and Video Delivery products are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an unprivileged attacker to execute arbitrary commands on the affected system and completely compromise the affected devices. This issue is being tracked by Cisco bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. Cisco Wide Area Application Services (WAAS) is a set of WAN link acceleration software from Cisco. This software is mainly used in the link environment with small bandwidth and large delay
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0091", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wide area application services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.5" }, { "model": "wide area application services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.3" }, { "model": "wide area application services", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1.7" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.25" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.21" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.19" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.1.10" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0" }, { "model": "internet streamer content delivery system", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.6" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.7.10" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.4.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.7.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.3.17" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.3.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.13.1" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.15.2" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.11.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.5.9" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.11" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.3.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.23" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.17" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.29" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.15.1" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.7.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.9.5" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.9" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.4.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.1" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.4.5.7" }, { "model": "videoscape delivery system origin server", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.1" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.1.7" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.4.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.1" }, { "model": "videoscape distribution suite service broker", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1.0" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.1" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.27" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.3" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.17" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.7" }, { "model": "videoscape delivery system for internet streamer", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.1" }, { "model": "internet streamer content delivery system", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.11.6" }, { "model": "videoscape distribution suite optimization engine", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.0" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.9.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.21" }, { "model": "enterprise content delivery network software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0" }, { "model": "videoscape delivery system for internet streamer", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.0" }, { "model": "videoscape distribution suite service broker", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.0" }, { "model": "internet streamer content delivery system", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1" }, { "model": "videoscape distribution suite service broker", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.1" }, { "model": "enterprise content delivery network software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.5.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.5.4" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.23" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.9.9" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.27" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.11.2" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.4.7" }, { "model": "enterprise content delivery network software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.5.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.3.15" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.5.2" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.13.2" }, { "model": "videoscape delivery system for internet streamer", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2.0" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.1.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.15.5" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.3.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.3" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.3" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.7.7" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.19" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.13" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.25" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0.9.9" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.5.13.7" }, { "model": "wide area application services", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.5" }, { "model": "application and content networking system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1.7.7" }, { "model": "videoscape distribution suite for internet streaming", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "3.2.x" }, { "model": "application and content networking system", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.5.29.2" }, { "model": "cds-is software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "3.1.x" }, { "model": "cds-is software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.6.3.b50" }, { "model": "ecds software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.5.6" }, { "model": "wide area application services software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.0.3e" }, { "model": "vds-oe software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.x" }, { "model": "vds-sb software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.1.0-b96" }, { "model": "vds-oe software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.0.1" }, { "model": "cds-is software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "2.x" }, { "model": "videoscape distribution suite for internet streaming", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.2.1.b9" }, { "model": "wide area application services software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.1.x" }, { "model": "application and content networking system", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "vds-sb software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.x" }, { "model": "cds-is software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.1.2b54" }, { "model": "vds-os software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.x" }, { "model": "wide area application services software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.2.1" }, { "model": "ecds software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "2.x" }, { "model": "wide area application services software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.1.1c" }, { "model": "wide area application services software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.2.x" }, { "model": "application and content networking system", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.x" }, { "model": "wide area application services software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5.17" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" } ], "sources": [ { "db": "BID", "id": "61543" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "CNNVD", "id": "CNNVD-201308-002" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:application_and_content_networking_system_software", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:internet_streamer_content_delivery_system", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:enterprise_content_delivery_network_software", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:videoscape_distribution_suite_optimization_engine", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:videoscape_delivery_system_origin_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:videoscape_distribution_suite_service_broker", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:videoscape_distribution_suite_for_internet_streaming", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:wide_area_application_services", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003631" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "61543" } ], "trust": 0.3 }, "cve": "CVE-2013-3444", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2013-3444", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-63446", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3444", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3444", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201308-002", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-63446", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-63446" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "CNNVD", "id": "CNNVD-201308-002" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. plural Cisco Product Web Framework central management mode (central-management mode) Contains a vulnerability that allows arbitrary command execution. Vendors have confirmed this vulnerability Bug ID CSCug40609 , CSCug48855 , CSCug48921 , CSCug48872 , CSCuh21103 , CSCuh21020 ,and CSCug56790 It is released as.By a remotely authenticated user GUI An arbitrary command may be executed by adding a specially crafted string to the field value. Multiple Cisco Content Network and Video Delivery products are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an unprivileged attacker to execute arbitrary commands on the affected system and completely compromise the affected devices. \nThis issue is being tracked by Cisco bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. Cisco Wide Area Application Services (WAAS) is a set of WAN link acceleration software from Cisco. This software is mainly used in the link environment with small bandwidth and large delay", "sources": [ { "db": "NVD", "id": "CVE-2013-3444" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "BID", "id": "61543" }, { "db": "VULHUB", "id": "VHN-63446" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3444", "trust": 2.8 }, { "db": "BID", "id": "61543", "trust": 1.4 }, { "db": "SECUNIA", "id": "54367", "trust": 1.1 }, { "db": "SECUNIA", "id": "54372", "trust": 1.1 }, { "db": "SECUNIA", "id": "54369", "trust": 1.1 }, { "db": "SECUNIA", "id": "54370", "trust": 1.1 }, { "db": "SECTRACK", "id": "1028853", "trust": 1.1 }, { "db": "SECTRACK", "id": "1028852", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2013-003631", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201308-002", "trust": 0.7 }, { "db": "CISCO", "id": "20130731 AUTHENTICATED COMMAND INJECTION VULNERABILITY IN MULTIPLE CISCO CONTENT NETWORK AND VIDEO DELIVERY PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63446", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63446" }, { "db": "BID", "id": "61543" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "CNNVD", "id": "CNNVD-201308-002" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "id": "VAR-201308-0091", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-63446" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:28:02.277000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130731-cm", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-cm" }, { "title": "30212", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30212" }, { "title": "cisco-sa-20130731-cm", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/111/1119/1119241_cisco-sa-20130731-cm-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003631" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63446" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130731-cm" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/61543" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1028852" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1028853" }, { "trust": 1.1, "url": "http://secunia.com/advisories/54367" }, { "trust": 1.1, "url": "http://secunia.com/advisories/54369" }, { "trust": 1.1, "url": "http://secunia.com/advisories/54370" }, { "trust": 1.1, "url": "http://secunia.com/advisories/54372" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86122" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3444" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3444" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63446" }, { "db": "BID", "id": "61543" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "CNNVD", "id": "CNNVD-201308-002" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-63446" }, { "db": "BID", "id": "61543" }, { "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "db": "CNNVD", "id": "CNNVD-201308-002" }, { "db": "NVD", "id": "CVE-2013-3444" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-01T00:00:00", "db": "VULHUB", "id": "VHN-63446" }, { "date": "2013-07-31T00:00:00", "db": "BID", "id": "61543" }, { "date": "2013-08-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "date": "2013-08-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-002" }, { "date": "2013-08-01T13:32:30.397000", "db": "NVD", "id": "CVE-2013-3444" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-63446" }, { "date": "2013-07-31T00:00:00", "db": "BID", "id": "61543" }, { "date": "2013-08-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003631" }, { "date": "2013-08-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-002" }, { "date": "2017-08-29T01:33:23.543000", "db": "NVD", "id": "CVE-2013-3444" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Product Web Framework arbitrary command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003631" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.