Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1961— Cisco Enterprise NFV Infrastructure Software Web Portal Arbitrary File Read Vulnerability

EPSS 0.31% · P55
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-1961

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Enterprise NFV Infrastructure Software Web Portal Arbitrary File Read Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to the improper input validation of tar packages uploaded through the Web Portal to the Image Repository. An attacker could exploit this vulnerability by uploading a crafted tar package and viewing the log entries that are generated. A successful exploit could allow the attacker to read arbitrary files on the underlying OS.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过日志文件的信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Enterprise NFV Infrastructure Software 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Enterprise NFV Infrastructure Software(NFVIS)是美国思科(Cisco)公司的一套NVF基础架构软件平台。该平台可以通过中央协调器和控制器实现虚拟化服务的全生命周期管理。 Cisco Enterprise NFVIS 3.10.1之前版本中存在输入验证错误漏洞,该漏洞源于程序没有对通过Web门户上传到Image Repository中的tar包进行正确的输入验证。远程攻击者可通过上传特制的tar包并查看日志条目利用该漏洞读取底层操作系统上的任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Enterprise NFV Infrastructure Software unspecified ~ n/a -

II. Public POCs for CVE-2019-1961

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-1961

登录查看更多情报信息。

Same Patch Batch · Cisco · 2019-08-08 · 17 CVEs total

CVE-2019-1973Cisco Enterprise NFV Infrastructure Software Cross-site Scripting Vulnerability
CVE-2019-1959Cisco Enterprise NFV Infrastructure Software Arbitrary File Read Vulnerabilities
CVE-2019-1960Cisco Enterprise NFV Infrastructure Software Arbitrary File Read Vulnerabilities
CVE-2019-1970Cisco Firepower Threat Defense Software File Policy Bypass Vulnerability
CVE-2019-1971Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability
CVE-2019-1972Cisco Enterprise NFV Infrastructure Software Privilege Escalation Vulnerability
CVE-2019-1953Cisco Enterprise NFV Infrastructure Software Password Recovery Vulnerability
CVE-2019-1954Cisco Webex Meetings Server Open Redirection Vulnerability
CVE-2019-1955Cisco Email Security Appliance Header Injection Vulnerability
CVE-2019-1956Cisco SPA112 2-Port Phone Adapter Stored Cross-Site Scripting Vulnerability
CVE-2019-1957Cisco IoT Field Network Director TLS Renegotiation Denial of Service Vulnerability
CVE-2019-1958Cisco HyperFlex Software Cross-Site Request Forgery Vulnerability
CVE-2019-1949Cisco Firepower Management Center Persistent Cross-Site Scripting Vulnerability
CVE-2019-1951Cisco SD-WAN Solution Packet Filtering Bypass Vulnerability
CVE-2019-1952Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability
CVE-2019-1946Cisco Enterprise NFV Infrastructure Software Web-Based Management Interface Authentication

IV. Related Vulnerabilities

V. Comments for CVE-2019-1961

No comments yet


Leave a comment