A vulnerability in the web interface of Cisco Prime Collaboration Provisioning Software (prior to Release 12.1) could allow an authenticated, remote attacker to delete any file from an affected system. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests and fails to apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request that uses directory traversal techniques to submit a path to a desired file location on an affected system. A successful exploit could allow the attacker to delete any file from the system. Cisco Bug IDs: CSCvc99597.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Prime_collaboration_provisioning | Cisco | 9.0.0 (including) | 9.0.0 (including) |
Prime_collaboration_provisioning | Cisco | 9.5.0 (including) | 9.5.0 (including) |
Prime_collaboration_provisioning | Cisco | 10.0.0 (including) | 10.0.0 (including) |
Prime_collaboration_provisioning | Cisco | 10.5.0 (including) | 10.5.0 (including) |
Prime_collaboration_provisioning | Cisco | 10.5.1 (including) | 10.5.1 (including) |
Prime_collaboration_provisioning | Cisco | 10.6.0 (including) | 10.6.0 (including) |
Prime_collaboration_provisioning | Cisco | 10.6.2 (including) | 10.6.2 (including) |
Prime_collaboration_provisioning | Cisco | 11.0.0 (including) | 11.0.0 (including) |
Prime_collaboration_provisioning | Cisco | 11.1.0 (including) | 11.1.0 (including) |
Prime_collaboration_provisioning | Cisco | 11.5.0 (including) | 11.5.0 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.