Directory traversal vulnerability in the Real-Time Monitoring Tool (RTMT) in Cisco Unified Communications Manager (CM) 10.0(1) allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup57676.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://tools.cisco.com/security/center/viewAlert.x?alertId=34909 | vendor advisory |
http://www.securitytracker.com/id/1030554 | vdb entry |
http://secunia.com/advisories/59734 | third party advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3319 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94436 | vdb entry |