var-201310-0517
Vulnerability from variot
Directory traversal vulnerability in the attachment service in the Voice Message Web Service (aka VMWS or Cisco Unity Web Service) in Cisco Unity Connection allows remote authenticated users to create files, and consequently execute arbitrary JSP code, via a crafted pathname for a file that is not a valid audio file, aka Bug ID CSCuj22948. Exploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuj22948. The platform can use voice commands to make calls or listen to messages "hands-free"
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0517", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unity connection", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "unity connection", "scope": "lte", "trust": 0.8, "vendor": "cisco", "version": "9.1(2)" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1" } ], "sources": [ { "db": "BID", "id": "63206" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "CNNVD", "id": "CNNVD-201310-473" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:unity_connection", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004816" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Emerging Defense, LLC", "sources": [ { "db": "BID", "id": "63206" } ], "trust": 0.3 }, "cve": "CVE-2013-5534", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2013-5534", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-65536", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5534", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-5534", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201310-473", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65536", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65536" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "CNNVD", "id": "CNNVD-201310-473" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the attachment service in the Voice Message Web Service (aka VMWS or Cisco Unity Web Service) in Cisco Unity Connection allows remote authenticated users to create files, and consequently execute arbitrary JSP code, via a crafted pathname for a file that is not a valid audio file, aka Bug ID CSCuj22948. \nExploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks. \nThis issue is being tracked by Cisco Bug ID CSCuj22948. The platform can use voice commands to make calls or listen to messages \"hands-free\"", "sources": [ { "db": "NVD", "id": "CVE-2013-5534" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "BID", "id": "63206" }, { "db": "VULHUB", "id": "VHN-65536" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5534", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004816", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-473", "trust": 0.7 }, { "db": "CISCO", "id": "20131017 CISCO UNITY CONNECTION DIRECTORY TRAVERSAL VULNERABILITY", "trust": 0.6 }, { "db": "BID", "id": "63206", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65536", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65536" }, { "db": "BID", "id": "63206" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "CNNVD", "id": "CNNVD-201310-473" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "id": "VAR-201310-0517", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65536" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:13:51.383000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco Unity Connection Directory Traversal Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5534" }, { "title": "31352", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31352" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004816" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65536" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5534" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5534" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5534" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6509/index.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65536" }, { "db": "BID", "id": "63206" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "CNNVD", "id": "CNNVD-201310-473" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65536" }, { "db": "BID", "id": "63206" }, { "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "db": "CNNVD", "id": "CNNVD-201310-473" }, { "db": "NVD", "id": "CVE-2013-5534" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-19T00:00:00", "db": "VULHUB", "id": "VHN-65536" }, { "date": "2013-10-17T00:00:00", "db": "BID", "id": "63206" }, { "date": "2013-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "date": "2013-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-473" }, { "date": "2013-10-19T10:36:08.167000", "db": "NVD", "id": "CVE-2013-5534" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-21T00:00:00", "db": "VULHUB", "id": "VHN-65536" }, { "date": "2013-10-21T00:18:00", "db": "BID", "id": "63206" }, { "date": "2013-10-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004816" }, { "date": "2013-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-473" }, { "date": "2024-11-21T01:57:39.413000", "db": "NVD", "id": "CVE-2013-5534" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Unity Connection of Voice Message Web Service of attachment Directory traversal vulnerability in services", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004816" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-473" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.