CVE编号
CVE-2019-1620利用情况
暂无补丁情况
N/A披露时间
2019-06-27漏洞描述
Cisco Data Center Network Manager (DCNM)是Cisco的一套数据中心网络管理器,可对网络进行多协议管理,并对交换机的运行状况和性能提供故障排除功能。Cisco Data Center Network Manager (DCNM) 11.0(1)的基于Web的管理界面存在任意文件上传漏洞。远程未认证攻击者可通过上传特制数据利用该漏洞在文件系统上写入任意文件,从而能以root权限执行代码。
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo64647
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager... | |
http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager... | |
http://seclists.org/fulldisclosure/2019/Jul/7 | |
http://www.securityfocus.com/bid/108906 | |
https://seclists.org/bugtraq/2019/Jul/11 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | data_center_network_manager | 11.0(1) | - | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | ruby | * |
Up to (excluding) 2.5.7-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | ruby | * |
Up to (excluding) 2.6.5-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | ruby | * |
Up to (excluding) 2.6.5-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | ruby | * |
Up to (excluding) 2.6.5-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | ruby | * |
Up to (excluding) 2.4.10-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | ruby | * |
Up to (excluding) 2.5.7-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | ruby | * |
Up to (excluding) 2.5.7-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | ruby | * |
Up to (excluding) 2.6.5-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | ruby | * |
Up to (excluding) 2.6.14.4-2.12.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | ruby24 | * |
Up to (excluding) 1.4.1-107.module+el8.4.0+10830+bbd85cce |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | ruby | * |
Up to (excluding) 9.1.17.0-3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | ruby | * |
Up to (excluding) 9.1.17.0-3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | ruby | * |
Up to (excluding) 1.5.6-9+deb8u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | ruby | * |
Up to (excluding) 1.7.26-1+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | ruby | * |
Up to (excluding) 9.1.17.0-3 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | ruby | * |
Up to (excluding) 2.5.7-lp151.4.6.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | ruby24 | * |
Up to (excluding) 2.6.7-107.module+el8.4.0+20235+1e5b8be3 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | ruby24 | * |
Up to (excluding) 1.4.1-107.module+el8.4.0+10830+bbd85cce |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...