Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7072B5B6-EA73-42D3-BC91-2068780D9C6D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.2:fips:*:*:*:*:*:*", "matchCriteriaId": "E0BFC4EB-CF72-4CA9-9F02-6DAB0434BB05", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.2\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "146E4ECF-B903-488C-8644-932FC57F072C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.2\\(1.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E3673F8-B07C-4FA5-8196-89D6F0B9E3B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.2\\(2.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC8A8BA2-851E-454C-B734-974F4DFFCF96", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "315278ED-B357-45B0-966B-15A69CDF4AC2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.3\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "A67FAFC9-7F4B-4CB5-AF27-74E20DD21B2D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1680DA56-F41F-4F6A-A569-EA4A90981226", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.4\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8A791DF-D671-40EC-8665-0701ED9C37D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:prime_infrastructure:3.5\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D6C6D02-3E21-4341-909C-8C9447E5FE43", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions could allow an unauthenticated, remote attacker to upload an arbitrary file. This file could allow the attacker to execute commands at the privilege level of the user prime. This user does not have administrative or root privileges. The vulnerability is due to an incorrect permission setting for important system directories. An attacker could exploit this vulnerability by uploading a malicious file by using TFTP, which can be accessed via the web-interface GUI. A successful exploit could allow the attacker to run commands on the targeted application without authentication."}, {"lang": "es", "value": "Una vulnerabilidad por la cual el servidor web HTTP para Cisco Prime Infrastructure (PI) tiene permisos sin restricci\u00f3n en directorios podr\u00eda permitir que un atacante remoto no autenticado suba un archivo arbitrario. Este archivo podr\u00eda permitir que el atacante ejecute comandos al nivel de privilegios del usuario prime. Este usuario no tiene privilegios root o administrativos. La vulnerabilidad se debe a una configuraci\u00f3n de permisos incorrecta para directorios importantes del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad subiendo un archivo malicioso mediante TFTP, al cual se puede acceder mediante la interfaz web gr\u00e1fica. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos en la aplicaci\u00f3n objetivo sin autenticaci\u00f3n."}], "id": "CVE-2018-15379", "lastModified": "2024-11-21T03:50:39.770", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-10-05T14:29:07.013", "references": [{"source": "ykramarz@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/105506"}, {"source": "ykramarz@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1041816"}, {"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-tftp"}, {"source": "ykramarz@cisco.com", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/45555/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/105506"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1041816"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-tftp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/45555/"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-275"}], "source": "ykramarz@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}