Cisco Data Center Network Manager processImageSave_jsp Remote Code Execution VulnerabilityZDI-13-254: November 24th, 2013
Data Center Network Manager
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Data Center Network Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processImageSave_jsp servlet which contains an arbitrary file creation vulnerability. When the 'mode' argument of a GET request is set to 'save', a remote attacker can specify other arguments that allow for control of the data and location of the file. A remote attacker can abuse this to execute remote code under the context of the SYSTEM user.
Vendor ResponseCisco has issued an update to correct this vulnerability. More details can be found at:
2013-02-22 - Vulnerability reported to vendor
2013-11-24 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi aka rgod