CVE-2017-6712
Published Jul 6, 2017
Last updated 7 years ago
Overview
- Description
- A vulnerability in certain commands of Cisco Elastic Services Controller could allow an authenticated, remote attacker to elevate privileges to root and run dangerous commands on the server. The vulnerability occurs because a "tomcat" user on the system can run certain shell commands, allowing the user to overwrite any file on the filesystem and elevate privileges to root. This vulnerability affects Cisco Elastic Services Controller prior to releases 2.3.1.434 and 2.3.2. Cisco Bug IDs: CSCvc76634.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "382A6F13-572D-4F0F-A563-2DA5D2AA1686" }, { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B56D33A-3027-4A5E-9FFC-C565865670EA" }, { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2B4001C-0835-4D77-8930-02A96BAF6BD4" }, { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3A98B6A-3861-43B8-86ED-7DE8C95C1D7B" }, { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60DA8739-DE37-4086-86C1-3740195DC121" }, { "criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66268BF5-4D8B-4A84-87C1-637CAA18C429" } ], "operator": "OR" } ] } ]