First published: Thu May 16 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <3.0.1 | |
Cisco Prime Infrastructure | <3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1818.
CVE-2019-1818 has a severity rating of 6.5, which is considered medium.
The software affected by CVE-2019-1818 includes Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager.
An authenticated, remote attacker can exploit CVE-2019-1818 to download and view files within the application that should be restricted.
Yes, you can find more information about CVE-2019-1818 at the following references: http://www.securityfocus.com/bid/108352 and https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-pathtrav-1818.