First published: Mon May 22 2017(Updated: )
A vulnerability in the web interface of Cisco Prime Collaboration Provisioning Software (prior to Release 11.1) could allow an authenticated, remote attacker to delete any file from an affected system. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests and fails to apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request that uses directory traversal techniques to submit a path to a desired file location on an affected system. A successful exploit could allow the attacker to delete any file from the system. Cisco Bug IDs: CSCvc99618.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Collaboration Provisioning | =9.0.0 | |
Cisco Prime Collaboration Provisioning | =9.5.0 | |
Cisco Prime Collaboration Provisioning | =10.0.0 | |
Cisco Prime Collaboration Provisioning | =10.5.0 | |
Cisco Prime Collaboration Provisioning | =10.5.1 | |
Cisco Prime Collaboration Provisioning | =10.6.0 | |
Cisco Prime Collaboration Provisioning | =10.6.2 | |
Cisco Prime Collaboration Provisioning | =11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6637 has a critical severity rating due to its potential for authenticated remote file deletion.
To fix CVE-2017-6637, upgrade the Cisco Prime Collaboration Provisioning Software to version 11.1 or later.
CVE-2017-6637 affects versions 9.0.0 through 10.6.2 of Cisco Prime Collaboration Provisioning.
Yes, CVE-2017-6637 can be exploited by authenticated remote attackers.
There are no specific workarounds for CVE-2017-6637; updating to a fixed version is recommended.