A vulnerability in the File Management Utility, the Download File form, and the Serviceability application of Cisco Emergency Responder could allow an authenticated, remote attacker to access files in arbitrary locations on the file system of an affected device.

The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames.

An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer1
A vulnerability in the File Management Utility, the Download File form, and the Serviceability application of Cisco Emergency Responder could allow an authenticated, remote attacker to access files in arbitrary locations on the file system of an affected device.

The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames.

An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cer1

Security Impact Rating: Medium

CVE: CVE-2016-9208

Leave a Reply