发布时间 :2006-04-21 06:02:00
修订时间 :2017-07-19 21:31:03

[原文]Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.

[CNNVD]Cisco WLSE archiveApplyDisplay.jsp跨站脚本漏洞(CNNVD-200604-423)

        CiscoWorks WLSE是集中的系统级应用程序,用于管理和控制整个自治Cisco WLAN基础架构。
        CiscoWorks WLSE配置管理脚本的实现上存在漏洞,攻击者可能利用此漏洞获取敏感信息。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:cisco:hosting_solution_engine:1.7.2Cisco Hosting Solution Engine 1.7.2
cpe:/a:cisco:user_registration_toolCisco User Registration Tool
cpe:/h:cisco:hosting_solution_engine:1.7.3Cisco Hosting Solution Engine 1.7.3
cpe:/h:cisco:hosting_solution_engine:1.7.0Cisco Hosting Solution Engine 1.7.0
cpe:/h:cisco:hosting_solution_engine:1.7.1Cisco Hosting Solution Engine 1.7.1
cpe:/a:cisco:ciscoworks_2000_service_management_solutionCisco CiscoWorks 2000 Service Management Solution
cpe:/o:cisco:ethernet_subscriber_solution_engineCisco Ethernet Subscriber Solution Engine
cpe:/a:cisco:wireless_lan_solution_engine:2.9Cisco Wireless LAN Solution Engine 2.9
cpe:/a:cisco:wireless_lan_solution_engine:2.4Cisco Wireless LAN Solution Engine 2.4
cpe:/a:cisco:wireless_lan_solution_engine:2.6Cisco Wireless LAN Solution Engine 2.6
cpe:/a:cisco:wireless_lan_solution_engine:2.5Cisco Wireless LAN Solution Engine 2.5
cpe:/a:cisco:wireless_lan_solution_engine:2.7Cisco Wireless LAN Solution Engine 2.7
cpe:/a:cisco:wireless_lan_solution_engine:2.2Cisco Wireless LAN Solution Engine 2.2
cpe:/a:cisco:wireless_lan_solution_engine:2.1Cisco Wireless LAN Solution Engine 2.1
cpe:/a:cisco:wireless_lan_solution_engine:2.3Cisco Wireless LAN Solution Engine 2.3
cpe:/a:cisco:wireless_lan_solution_engine:2.8Cisco Wireless LAN Solution Engine 2.8
cpe:/a:cisco:wireless_lan_solution_engine:2.13Cisco Wireless LAN Solution Engine 2.13
cpe:/a:cisco:wireless_lan_solution_engine:2.12Cisco Wireless LAN Solution Engine 2.12
cpe:/h:cisco:hosting_solution_engine:1.7Cisco Hosting Solution Engine 1.7
cpe:/a:cisco:wireless_lan_solution_engine:2.0Cisco Wireless LAN Solution Engine 2.0
cpe:/a:cisco:wireless_lan_solution_engine:2.10Cisco Wireless LAN Solution Engine 2.10
cpe:/a:cisco:wireless_lan_solution_engine:2.11Cisco Wireless LAN Solution Engine 2.11

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  SECTRACK  1015965
(PATCH)  CISCO  20060419 Multiple Vulnerabilities in the WLSE Appliance
(PATCH)  CISCO  20060419 Response to Privilege Escalation on Multiple Cisco Products
(UNKNOWN)  BUGTRAQ  20060419 Re: Multiple vulnerabilities in Linux based Cisco products
(UNKNOWN)  BUGTRAQ  20060419 Multiple vulnerabilities in Linux based Cisco products
(UNKNOWN)  BID  17609
(UNKNOWN)  VUPEN  ADV-2006-1434
(UNKNOWN)  VUPEN  ADV-2006-1435
(UNKNOWN)  XF  cisco-wlse-shell-privilege-escalation(25884)

- 漏洞信息

Cisco WLSE archiveApplyDisplay.jsp跨站脚本漏洞
高危 输入验证
2006-04-21 00:00:00 2007-08-13 00:00:00
        CiscoWorks WLSE是集中的系统级应用程序,用于管理和控制整个自治Cisco WLAN基础架构。
        CiscoWorks WLSE配置管理脚本的实现上存在漏洞,攻击者可能利用此漏洞获取敏感信息。

- 公告与补丁


- 漏洞信息

Cisco Multiple Products show Command Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Multiple Cisco products contain a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when specially crafted show commands are issued which allow an attacker to break out of the Cisco shell and execute commands as the root user on the system. This flaw may lead to a loss of integrity.

- 时间线

2006-04-19 Unknow
2006-04-19 Unknow

- 解决方案

For the Wireless LAN Solution Engine, upgrade to version 2.13 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. Ethernet Subscriber Solution Engine and CiscoWorks2000 Service Management Solution have reached End-of-Life, and no solution is provided for these products. For the User Registration Tool, upgrade to version 2.5.5(A1) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. Currently, there are no known workarounds or upgrades to correct this issue in the Hosting Solution Engine. However, Cisco has released a patch (HSE-PSIRT1) to address this vulnerability.

- 相关参考

- 漏洞作者