Vulnerability Details : CVE-2013-5486
Public exploit exists!
Directory traversal vulnerability in processImageSave.jsp in DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) before 6.2(1) allows remote attackers to write arbitrary files via the chartid parameter, aka Bug IDs CSCue77035 and CSCue77036. NOTE: this can be leveraged to execute arbitrary commands by using the JBoss autodeploy functionality.
Vulnerability category: Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2013-5486
Probability of exploitation activity in the next 30 days: 97.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-5486
-
Cisco Prime Data Center Network Manager Arbitrary File Upload
Disclosure Date: 2013-09-18First seen: 2020-04-26exploit/multi/http/cisco_dcnm_uploadThis module exploits a code execution flaw in Cisco Data Center Network Manager. The vulnerability exists in processImageSave.jsp, which can be abused through a directory traversal and a null byte injection to upload arbitrary files. The autodeploy JBoss application
CVSS scores for CVE-2013-5486
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2013-5486
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5486
-
http://www.exploit-db.com/exploits/30008
Cisco Prime Data Center Network Manager - Arbitrary File Upload (Metasploit) - Java remote ExploitExploit;Third Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm
Multiple Vulnerabilities in Cisco Prime Data Center Network ManagerVendor Advisory
Products affected by CVE-2013-5486
- cpe:2.3:a:cisco:prime_data_center_network_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2c\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2b\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\(1b\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(3u\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(5\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\(4\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\(1a\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\(2e\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\(3\):*:*:*:*:*:*:*