Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

According to its self-reported version, the version of Cisco Video
Surveillance Manager installed on the remote host is affected by
multiple vulnerabilities :

- The application is affected by a directory traversal
vulnerability because Cisco VSM does not properly
validate user-supplied input to the
'monitor/logselect.php' and 'read_log.jsp' scripts.
This can allow a remote, unauthorized attacker to gain
access to arbitrary files on the remote host by sending
a specially crafted request. (CVE-2013-3429)

- The application allows access to sensitive data without
requiring authentication. Data such as configuration,
monitoring pages archives, and system logs can be
accessed by attackers without requiring authentication.
(CVE-2013-3430, CVE-2013-3431)

See also :

http://www.nessus.org/u?c348fd4b

Solution :

Upgrade to Cisco Video Surveillance Manager 7.0.0 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:P)
CVSS Temporal Score : 7.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 69856 ()

Bugtraq ID: 61430
61431
61432

CVE ID: CVE-2013-3429
CVE-2013-3430
CVE-2013-3431