First published: Mon Apr 22 2002(Updated: )
The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.0.1 | |
Cisco Secure Access Control Server | =2.6.2 | |
Cisco Secure Access Control Server | =2.6.3 | |
Cisco Secure Access Control Server | =3.0 | |
Cisco Secure Access Control Server | =2.6.4 | |
Cisco Secure Access Control Server | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0160 is classified as a moderate severity vulnerability due to potential unauthorized access to sensitive files.
To fix CVE-2002-0160, upgrade to a version of Cisco Secure Access Control Server that is later than 3.0.1.
The versions affected by CVE-2002-0160 include 2.6.x up to 2.6.4 and 3.x through 3.0.1.
CVE-2002-0160 can be exploited by remote attackers to access files outside the web root using directory traversal techniques.
A recommended workaround for CVE-2002-0160 is to restrict network access to the vulnerable server until an upgrade can be performed.