Advisory Details

December 15th, 2013

Cisco WAAS Mobile Server ReportReceiver CAB Processing Remote Code Execution Vulnerability

ZDI-13-276
ZDI-CAN-1862

CVE ID CVE-2013-5554
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Cisco
AFFECTED PRODUCTS WAAS Mobile Server
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CISCO WAAS Mobile Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of CAB files uploaded through ReportReceiver. By uploading a crafted CAB file, an attacker is able to add a hostile web page to the web server. Using this, an attacker is able to run arbitrary code as either DefaultAppPool or NetworkService, depending on the operating system version.

ADDITIONAL DETAILS Cisco has issued an update to correct this vulnerability. More details can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-waasm
DISCLOSURE TIMELINE
  • 2013-06-21 - Vulnerability reported to vendor
  • 2013-12-15 - Coordinated public release of advisory
CREDIT Andrea Micalizzi aka rgod
BACK TO ADVISORIES