exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20160406-privauth

Cisco Security Advisory 20160406-privauth
Posted Apr 7, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the application programming interface (API) web interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to gain elevated privileges. The vulnerability is due to improper role-based access control (RBAC) when an unexpected HTTP URL request is received that does not match an expected pattern filter. An attacker could exploit this vulnerability by sending a crafted HTTP request with a modified URL to bypass RBAC settings. An exploit could allow the attacker to gain elevated privileges on the application to view and edit unauthorized data. Cisco has released software updates that address this vulnerability. Workarounds are not available.

tags | advisory, remote, web
systems | cisco
SHA-256 | 9d3bdc4e5f13f048163b3b33b01e614a8bc0bd55fb3ce905a671834d079141f4

Cisco Security Advisory 20160406-privauth

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Prime Infrastructure and Evolved Programmable Network Manager Privilege Escalation API Vulnerability

Advisory ID: cisco-sa-20160406-privauth

Revision 1.0

For Public Release 2016 April 6 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the application programming interface (API) web interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to gain elevated privileges.

The vulnerability is due to improper role-based access control (RBAC) when an unexpected HTTP URL request is received that does not match an expected pattern filter. An attacker could exploit this vulnerability by sending a crafted HTTP request with a modified URL to bypass RBAC settings. An exploit could allow the attacker to gain elevated privileges on the application to view and edit unauthorized data.

Cisco has released software updates that address this vulnerability. Workarounds are not available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=ICvg
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close