HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2001-14.html | us government resource patch exploit third party advisory |
http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com | mailing list |
http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html | exploit patch vendor advisory |
http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com | mailing list |
http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org | mailing list |
http://www.osvdb.org/578 | vdb entry |
http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu | mailing list |
http://www.ciac.org/ciac/bulletins/l-106.shtml | third party advisory government resource |
http://www.securityfocus.com/bid/2936 | exploit vdb entry patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6749 | vdb entry |