A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2018-10-17T22:00:00Z

Updated: 2024-09-16T23:15:31.096Z

Reserved: 2017-11-27T00:00:00

Link: CVE-2018-0420

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2018-10-17T22:29:00.457

Modified: 2023-02-03T19:21:26.437

Link: CVE-2018-0420

cve-icon Redhat

No data.