fkie_cve-2013-3429
Vulnerability from fkie_nvd
Published
2013-07-25 15:53
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple directory traversal vulnerabilities in Cisco Video Surveillance Manager (VSM) before 7.0.0 allow remote attackers to read system files via a crafted URL, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv37163.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | video_surveillance_manager | * | |
cisco | video_surveillance_manager | 1.1.0 | |
cisco | video_surveillance_manager | 1.2.1 | |
cisco | video_surveillance_manager | 2.0.0 | |
cisco | video_surveillance_manager | 2.1 | |
cisco | video_surveillance_manager | 2.1.2 | |
cisco | video_surveillance_manager | 2.1.3 | |
cisco | video_surveillance_manager | 2.1.4 | |
cisco | video_surveillance_manager | 2.1.6 | |
cisco | video_surveillance_manager | 2.1.7 | |
cisco | video_surveillance_manager | 2.3.0 | |
cisco | video_surveillance_manager | 2.3.1 | |
cisco | video_surveillance_manager | 4.0.1 | |
cisco | video_surveillance_manager | 4.2.0 | |
cisco | video_surveillance_manager | 4.2.1 | |
cisco | video_surveillance_manager | 6.3 | |
cisco | video_surveillance_manager | 6.3.1 | |
cisco | video_surveillance_manager | 6.3.2 | |
cisco | video_surveillance_manager | 6.3.2 | |
cisco | video_surveillance_manager | 6.3.2 | |
cisco | video_surveillance_manager | 6.3.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD249B8-2081-483D-A371-E38BA9D895CE", "versionEndIncluding": "6.3.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C863918-442B-44F5-ABF1-0A209832BB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF417FA9-46DA-4547-9C8C-8D13D152BD57", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E292612-353A-425C-B6BB-456769A62C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FE9386E-AE00-4FC4-BBA5-98A02FE530B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0CB2181A-A8D0-40F5-98E7-B56A604756FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8CDF94CF-DD9B-4469-BAD0-AC8FDAF6E22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "ABB39563-3E1C-4B00-B7BD-553425881957", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA29A6C0-D895-46D4-BB89-0E5BE3EFDA89", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "10067FC4-429B-462D-B609-4706D69964A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693F521-FB27-4025-8782-44706AC180D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "242EED01-3AC9-48D8-B860-E56DAD22CE70", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F597E6F7-C170-4B68-8601-6CEA2D4FE531", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF1C753D-BA59-458F-92E1-1E1C9E9921AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA7119A6-236F-4C9B-8A9C-19B5E434BB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D0E37235-B44C-4981-9152-4F969F240862", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEB98F7B-29B9-4C4D-AE4C-AFB5D50EBD51", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F46AF1F-C993-43F4-A5EA-5219139FBFD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr1:*:*:*:*:*:*", "matchCriteriaId": "E4982588-DCE4-4BD6-A0B1-FAB860A52C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr2:*:*:*:*:*:*", "matchCriteriaId": "873923F0-05AB-40D1-81A8-7AB02CFFAD56", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr3:*:*:*:*:*:*", "matchCriteriaId": "F705FECE-EF41-4A2B-93CB-F88039A82DFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in Cisco Video Surveillance Manager (VSM) before 7.0.0 allow remote attackers to read system files via a crafted URL, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv37163." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en Cisco Video Surveillance Manager (VSM) anteriores a v7.0.0 permite que atacantes remotos lean ficheros del sistema mediante URL modifificadas, relacionadas con el paquete Cisco_VSBWT (tambi\u00e9n conocido como c\u00f3digo de ejemplo Broadware), tambi\u00e9n referenciado como Bug ID CSCsv37163." } ], "id": "CVE-2013-3429", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-25T15:53:16.203", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/61430" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1028827" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85947" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…