Cisco WAAS Mobile Server ReportReceiver CAB Processing Remote Code Execution VulnerabilityZDI-13-276: December 15th, 2013
WAAS Mobile Server
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CISCO WAAS Mobile Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of CAB files uploaded through ReportReceiver. By uploading a crafted CAB file, an attacker is able to add a hostile web page to the web server. Using this, an attacker is able to run arbitrary code as either DefaultAppPool or NetworkService, depending on the operating system version.
Vendor ResponseCisco has issued an update to correct this vulnerability. More details can be found at:
2013-06-21 - Vulnerability reported to vendor
2013-12-15 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi aka rgod