ID

VAR-201705-3659


CVE

CVE-2017-6637


TITLE

Cisco Prime Collaboration Provisioning Software Web Path traversal vulnerability in the interface

Trust: 0.8

sources: JVNDB: JVNDB-2017-004240

DESCRIPTION

A vulnerability in the web interface of Cisco Prime Collaboration Provisioning Software (prior to Release 11.1) could allow an authenticated, remote attacker to delete any file from an affected system. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests and fails to apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request that uses directory traversal techniques to submit a path to a desired file location on an affected system. A successful exploit could allow the attacker to delete any file from the system. Cisco Bug IDs: CSCvc99618. Vendors have confirmed this vulnerability Bug ID CSCvc99618 It is released as.Information may be tampered with. Authentication is not required to exploit this vulnerability.The specific flaw exists within the logconfigtracer.jsp page, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. The software provides IP communications services functionality for IP telephony, voice mail, and unified communications environments

Trust: 2.61

sources: NVD: CVE-2017-6637 // JVNDB: JVNDB-2017-004240 // ZDI: ZDI-17-448 // BID: 98530 // VULHUB: VHN-114840

AFFECTED PRODUCTS

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6.2

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:9.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5.1

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:9.5.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.0.0

Trust: 1.6

vendor:ciscomodel:prime collaboration provisioningscope:ltversion:11.1

Trust: 0.8

vendor:ciscomodel:prime collaboration provisioningscope: - version: -

Trust: 0.7

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.6

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:10.0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:11.1

Trust: 0.3

sources: ZDI: ZDI-17-448 // BID: 98530 // JVNDB: JVNDB-2017-004240 // CNNVD: CNNVD-201705-908 // NVD: CVE-2017-6637

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6637
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6637
value: MEDIUM

Trust: 0.8

ZDI: CVE-2017-6637
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201705-908
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114840
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6637
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-6637
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-114840
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6637
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-17-448 // VULHUB: VHN-114840 // JVNDB: JVNDB-2017-004240 // CNNVD: CNNVD-201705-908 // NVD: CVE-2017-6637

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-22

Trust: 0.9

sources: VULHUB: VHN-114840 // JVNDB: JVNDB-2017-004240 // NVD: CVE-2017-6637

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201705-908

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 98530 // CNNVD: CNNVD-201705-908

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004240

PATCH

title:cisco-sa-20170517-pcp5url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp5

Trust: 1.5

sources: ZDI: ZDI-17-448 // JVNDB: JVNDB-2017-004240

EXTERNAL IDS

db:NVDid:CVE-2017-6637

Trust: 3.5

db:BIDid:98530

Trust: 2.0

db:SECTRACKid:1038515

Trust: 1.7

db:JVNDBid:JVNDB-2017-004240

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4469

Trust: 0.7

db:ZDIid:ZDI-17-448

Trust: 0.7

db:CNNVDid:CNNVD-201705-908

Trust: 0.7

db:VULHUBid:VHN-114840

Trust: 0.1

sources: ZDI: ZDI-17-448 // VULHUB: VHN-114840 // BID: 98530 // JVNDB: JVNDB-2017-004240 // CNNVD: CNNVD-201705-908 // NVD: CVE-2017-6637

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170517-pcp5

Trust: 2.7

url:http://www.securityfocus.com/bid/98530

Trust: 1.7

url:http://www.securitytracker.com/id/1038515

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6637

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6637

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: ZDI: ZDI-17-448 // VULHUB: VHN-114840 // BID: 98530 // JVNDB: JVNDB-2017-004240 // CNNVD: CNNVD-201705-908 // NVD: CVE-2017-6637

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-17-448

SOURCES

db:ZDIid:ZDI-17-448
db:VULHUBid:VHN-114840
db:BIDid:98530
db:JVNDBid:JVNDB-2017-004240
db:CNNVDid:CNNVD-201705-908
db:NVDid:CVE-2017-6637

LAST UPDATE DATE

2025-04-20T23:27:24.476000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-448date:2017-06-26T00:00:00
db:VULHUBid:VHN-114840date:2019-10-03T00:00:00
db:BIDid:98530date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004240date:2017-06-20T00:00:00
db:CNNVDid:CNNVD-201705-908date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6637date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-448date:2017-06-26T00:00:00
db:VULHUBid:VHN-114840date:2017-05-22T00:00:00
db:BIDid:98530date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004240date:2017-06-20T00:00:00
db:CNNVDid:CNNVD-201705-908date:2017-05-22T00:00:00
db:NVDid:CVE-2017-6637date:2017-05-22T01:29:00.447