Showing posts with label path traversal. Show all posts
Showing posts with label path traversal. Show all posts
Severity Rating: HIGH
Software Affected 
•Cisco ASA Software or FTD Software.

Overview 
Vulnerability has been reported in the web services interface of Cisco
Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat
Defense (FTD) Software which could allow an unauthenticated, remote
attacker to conduct directory traversal attacks and obtain read and delete
access to sensitive files on a targeted system. 

Description
A Vulnerability exists inthe web services interface of Cisco Adaptive
Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD)
Software due to a lack of proper input validation of the HTTP URL that
could allow the attacker to access sensitive files on a targeted system. An
attacker could exploit this vulnerability by sending a crafted HTTP request
containing directory traversal character sequences and allow the attacker
to view or delete arbitrary files on the targeted system. The file system
is enabled when the affected device is configured with either WebVPN or
AnyConnect features. When the device is reloaded after exploitation of this
vulnerability, any files that were deleted are restored. 

Successful exploitation of this vulnerability could allow the attacker to 
obtain read and delete access to sensitive files on a targeted system. 

Solution
Apply appropriate updates as mentioned in: 
- -sa-asaftd-path-JE3azWw43

Vendor Information
CISCO
- -sa-asaftd-path-JE3azWw43

References
CISCO
- -sa-asaftd-path-JE3azWw43

CVE Name
CVE-2020-3187
Severity Rating: HIGH
Software Affected 
•VMware Application Remote Collector (ARC) version 7.5.0
•VMware Application Remote Collector (ARC) version 8.0.x
•VMware Application Remote Collector (ARC) version 8.1.0

Overview 
Multiple vulnerabilities have been reported in VMware vRealize Operations
Application Remote Collector (ARC) which could allow a remote attacker to
bypass authentication and gain access to file system on the targeted
system. 
Description
1. Authentication Bypass Vulnerability in VMware vRealize Operations
Application Remote Collector (ARC) ( CVE-2020-11651   ) 
This vulnerability exists in VMware vRealize Operations Application Remote
Collector (ARC) when the salt-master process ClearFuncs class does not
properly validate method calls. A remote attacker could exploit this
vulnerability by executing arbitrary code on the affected systems.
Successful exploitation of this vulnerability could allow a remote attacker
with network access to port 4505 or 4506 on the ARC to take control of the
ARC and any Virtual Machines. 

2. Directory Traversal Vulnerability in VMware vRealize Operations
Application Remote Collector (ARC) ( CVE-2020-11652   ) 

This vulnerability exists in VMware vRealize Operations Application Remote
Collector (ARC) when the salt-master process ClearFuncs class allows access
to improperly sanitize paths of some methods. A remote attacker could
exploit this vulnerability by executing arbitrary code on the affected
systems.
Successful exploitation of this vulnerability could allow a remote attacker
with network access to port 4505 or 4506 on the ARC to access the entirety
of the ARC file system. 

Solution
Apply appropriate fix as mentioned in VMwares Security Advisory: 

Vendor Information
VMware

References
VMware

CVE Name
CVE-2020-11651
CVE-2020-11652

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top