CVE-2006-1961
CVSS7.5
发布时间 :2006-04-21 06:02:00
修订时间 :2011-03-07 21:34:42
NMCO    

[原文]Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.


[CNNVD]Cisco WLSE archiveApplyDisplay.jsp跨站脚本漏洞(CNNVD-200604-423)

        CiscoWorks WLSE是集中的系统级应用程序,用于管理和控制整个自治Cisco WLAN基础架构。
        CiscoWorks WLSE配置管理脚本的实现上存在漏洞,攻击者可能利用此漏洞获取敏感信息。
        WLSE设备中/wlse/configure/archive/archiveApplyDisplay.jsp的"displayMsg"参数可导致跨站脚本漏洞。攻击者可以利用这个漏洞窃取JSP会话cookie,然后结合其他漏洞获得对系统的管理级访问。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cisco:wireless_lan_solution_engine:2.9::express
cpe:/a:cisco:wireless_lan_solution_engine:2.8Cisco Wireless LAN Solution Engine 2.8
cpe:/a:cisco:wireless_lan_solution_engine:2.13Cisco Wireless LAN Solution Engine 2.13
cpe:/a:cisco:wireless_lan_solution_engine:2.4Cisco Wireless LAN Solution Engine 2.4
cpe:/o:cisco:ethernet_subscriber_solution_engineCisco Ethernet Subscriber Solution Engine
cpe:/a:cisco:wireless_lan_solution_engine:2.6::express
cpe:/a:cisco:wireless_lan_solution_engine:2.8::express
cpe:/h:cisco:hosting_solution_engine:1.7.3Cisco Hosting Solution Engine 1.7.3
cpe:/a:cisco:wireless_lan_solution_engine:2.1::express
cpe:/a:cisco:wireless_lan_solution_engine:2.0::express
cpe:/h:cisco:hosting_solution_engine:1.7.1Cisco Hosting Solution Engine 1.7.1
cpe:/a:cisco:wireless_lan_solution_engine:2.2::express
cpe:/a:cisco:wireless_lan_solution_engine:2.7::express
cpe:/a:cisco:ciscoworks_2000_service_management_solutionCisco CiscoWorks 2000 Service Management Solution
cpe:/h:cisco:hosting_solution_engine:1.7.0Cisco Hosting Solution Engine 1.7.0
cpe:/a:cisco:wireless_lan_solution_engine:2.13::express
cpe:/a:cisco:wireless_lan_solution_engine:2.5Cisco Wireless LAN Solution Engine 2.5
cpe:/a:cisco:wireless_lan_solution_engine:2.11Cisco Wireless LAN Solution Engine 2.11
cpe:/a:cisco:wireless_lan_solution_engine:2.0Cisco Wireless LAN Solution Engine 2.0
cpe:/a:cisco:wireless_lan_solution_engine:2.3Cisco Wireless LAN Solution Engine 2.3
cpe:/h:cisco:hosting_solution_engine:1.7.2Cisco Hosting Solution Engine 1.7.2
cpe:/a:cisco:wireless_lan_solution_engine:2.9Cisco Wireless LAN Solution Engine 2.9
cpe:/h:cisco:hosting_solution_engine:1.7Cisco Hosting Solution Engine 1.7
cpe:/a:cisco:wireless_lan_solution_engine:2.5::express
cpe:/a:cisco:wireless_lan_solution_engine:2.12::express
cpe:/a:cisco:wireless_lan_solution_engine:2.4::express
cpe:/a:cisco:wireless_lan_solution_engine:2.2Cisco Wireless LAN Solution Engine 2.2
cpe:/a:cisco:user_registration_toolCisco User Registration Tool
cpe:/a:cisco:wireless_lan_solution_engine:2.7Cisco Wireless LAN Solution Engine 2.7
cpe:/a:cisco:wireless_lan_solution_engine:2.1Cisco Wireless LAN Solution Engine 2.1
cpe:/a:cisco:wireless_lan_solution_engine:2.6Cisco Wireless LAN Solution Engine 2.6
cpe:/a:cisco:wireless_lan_solution_engine:2.10::express
cpe:/a:cisco:wireless_lan_solution_engine:2.12Cisco Wireless LAN Solution Engine 2.12
cpe:/a:cisco:wireless_lan_solution_engine:2.3::express
cpe:/a:cisco:wireless_lan_solution_engine:2.11::express
cpe:/a:cisco:wireless_lan_solution_engine:2.10Cisco Wireless LAN Solution Engine 2.10

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1961
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1961
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-423
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml
(PATCH)  CISCO  20060419 Response to Privilege Escalation on Multiple Cisco Products
http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
(PATCH)  CISCO  20060419 Multiple Vulnerabilities in the WLSE Appliance
http://securitytracker.com/id?1015965
(PATCH)  SECTRACK  1015965
http://secunia.com/advisories/19736
(VENDOR_ADVISORY)  SECUNIA  19736
http://xforce.iss.net/xforce/xfdb/25884
(UNKNOWN)  XF  cisco-wlse-shell-privilege-escalation(25884)
http://www.vupen.com/english/advisories/2006/1435
(UNKNOWN)  VUPEN  ADV-2006-1435
http://www.vupen.com/english/advisories/2006/1434
(UNKNOWN)  VUPEN  ADV-2006-1434
http://www.securityfocus.com/bid/17609
(UNKNOWN)  BID  17609
http://www.securityfocus.com/archive/1/archive/1/431371/30/5490/threaded
(UNKNOWN)  BUGTRAQ  20060419 Multiple vulnerabilities in Linux based Cisco products
http://www.securityfocus.com/archive/1/archive/1/431367/30/5490/threaded
(UNKNOWN)  BUGTRAQ  20060419 Re: Multiple vulnerabilities in Linux based Cisco products
http://www.osvdb.org/24813
(UNKNOWN)  OSVDB  24813
http://www.assurance.com.au/advisories/200604-cisco.txt
(UNKNOWN)  MISC  http://www.assurance.com.au/advisories/200604-cisco.txt
http://secunia.com/advisories/19741
(UNKNOWN)  SECUNIA  19741
http://secunia.com/advisories/19739
(UNKNOWN)  SECUNIA  19739

- 漏洞信息

Cisco WLSE archiveApplyDisplay.jsp跨站脚本漏洞
高危 输入验证
2006-04-21 00:00:00 2007-08-13 00:00:00
远程  
        CiscoWorks WLSE是集中的系统级应用程序,用于管理和控制整个自治Cisco WLAN基础架构。
        CiscoWorks WLSE配置管理脚本的实现上存在漏洞,攻击者可能利用此漏洞获取敏感信息。
        WLSE设备中/wlse/configure/archive/archiveApplyDisplay.jsp的"displayMsg"参数可导致跨站脚本漏洞。攻击者可以利用这个漏洞窃取JSP会话cookie,然后结合其他漏洞获得对系统的管理级访问。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
        http://www.cisco.com/cgi-bin/tablebuild.pl/wlan-sol-eng

- 漏洞信息

24813
Cisco Multiple Products show Command Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Multiple Cisco products contain a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when specially crafted show commands are issued which allow an attacker to break out of the Cisco shell and execute commands as the root user on the system. This flaw may lead to a loss of integrity.

- 时间线

2006-04-19 Unknow
2006-04-19 Unknow

- 解决方案

For the Wireless LAN Solution Engine, upgrade to version 2.13 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. Ethernet Subscriber Solution Engine and CiscoWorks2000 Service Management Solution have reached End-of-Life, and no solution is provided for these products. For the User Registration Tool, upgrade to version 2.5.5(A1) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. Currently, there are no known workarounds or upgrades to correct this issue in the Hosting Solution Engine. However, Cisco has released a patch (HSE-PSIRT1) to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站