Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] Cisco Prime Data Center Network Manager Remote Code Execution

Critical

Synopsis

While researching CVE-2017-6640, Tenable discovered an unauthenticated path traversal vulnerability in Cisco Prime Data Center Network Manager. The vulnerability is present in the XmpFileUploadServlet class in dcnmweb.war. As the name suggests, XmpFileUploadServlet handles file uploads over HTTP. As such, the path traversal can be used to write a file to any location on the server. An unauthenticated remote attacker can achieve remote code execution by uploading a war file that contains a JSP webshell.

Proof of concept:

curl -k -F 'data=@/tmp/webshell.war' "https://172.26.24.15/Upload?svc=upload&maxFileSize=100000&tacCaseID=../../../../Program%20Files/Cisco%20Systems/dcm/jboss-as-7.2.0.Final/standalone/sandeployments"

Cisco reports that this vulnerability also affects Cisco Prime Infrastructure. However, for that case an attacker first needs to be authenticated before they can reach the vulnerability.

Solution

Cisco has released fixes for both Data Center Network Manager and Prime Infrastructure. Read their advisory for patching information.

Disclosure Timeline

07-13-2017 - Vulnerability reported to Cisco
07-13-2017 - Cisco replies with case number PSIRT-0435286173
07-24-2017 - Cisco confirms the vulnerability
03-05-2018 - Tenable asks Cisco for a progress update
03-09-2018 - Cisco says patch release on April 18 or May 2
04-17-2018 - Tenable asks about release date
04-17-2018 - Cisco confirms release will occur on May 2
05-02-2018 - Cisco releases an advisory

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2018-0258
Tenable Advisory ID: TRA-2018-11
Credit:
Tenable, Inc.
CVSSv2 Base / Temporal Score:
10.0 / 8.3
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
Affected Products:
Cisco Prime Data Center Network Manager 10.0-10.2
Cisco Prime Infrastructure 3.0-3.1.7
Risk Factor:
Critical
Additional Keywords:
CSCvf32411
CSCvf81727

Advisory Timeline

05-04-2018 - [R1] Initial Release