Cisco UCS Central Software < 2.0(1c) HTTP Request Handling RCE

high Nessus Plugin ID 107150

Synopsis

An infrastructure management application running on the remote host is affected by a remote command execution vulnerability.

Description

The version of Cisco Unified Computing System (UCS) Central Software running on the remote host is prior to 1.3(1c). It is, therefore, affected by a flaw in its web framework due to improper validation of user-supplied input. An authenticated, remote attacker can exploit this, via a specially crafted HTTP request, to execute arbitrary commands on the underlying operating system as the daemon user.

Solution

Upgrade to Cisco UCS Central Software version 2.0(1c) or later.

See Also

http://www.nessus.org/u?b0db34de

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve70825

https://www.us-cert.gov/ncas/bulletins/SB18-043

Plugin Details

Severity: High

ID: 107150

File Name: cisco-sa-20180207-ucsc.nasl

Version: 1.4

Type: remote

Family: CISCO

Published: 3/6/2018

Updated: 11/8/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2018-0113

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:unified_computing_system_central_software

Required KB Items: installed_sw/Cisco UCS Central WebUI

Exploit Ease: No known exploits are available

Patch Publication Date: 2/7/2018

Vulnerability Publication Date: 2/7/2018

Reference Information

CVE: CVE-2018-0113

BID: 102966

CISCO-SA: cisco-sa-20180207-ucsc

CISCO-BUG-ID: CSCve70825