[原文]The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002.
Cisco SecureACS for Windows <= (2.6 and 3.0.1 build 40) contains a flaw that allows a remote attacker to access data outside of the web path. The issue is due to the program not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URL.
Currently, there are no known workarounds or upgrades to correct this issue. However, Cisco has released a patch to address this vulnerability.