Advisory Details

January 3rd, 2020

Cisco Data Center Network Manager readConfigFileFromDB Directory Traversal Information Disclosure Vulnerability

ZDI-20-015
ZDI-CAN-9139

CVE ID CVE-2019-15981
CVSS SCORE 6.5, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AFFECTED VENDORS Cisco
AFFECTED PRODUCTS Data Center Network Manager
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cisco Data Center Network Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the readConfigFileFromDB SOAP endpoint called by accessing the WebAnalysisWSService/WebAnalysis path in the service. When parsing the configFileName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this to disclose files in the context of SYSTEM.

ADDITIONAL DETAILS Cisco has issued an update to correct this vulnerability. More details can be found at:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav
DISCLOSURE TIMELINE
  • 2019-08-13 - Vulnerability reported to vendor
  • 2020-01-03 - Coordinated public release of advisory
CREDIT Steven Seeley (mr_me) of Source Incite
BACK TO ADVISORIES