A vulnerability in the archive utility of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to a lack of proper input validation of paths that are embedded within archive files. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to write arbitrary files in the system with the privileges of the logged-in user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-07-31 00:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-3383
Mitre link : CVE-2020-3383
CVE.ORG link : CVE-2020-3383
JSON object : View
Products Affected
cisco
- data_center_network_manager