A vulnerability in Cisco Enterprise Content Delivery System (ECDS) could allow an unauthenticated, remote attacker to conduct directory traversal attacks on a targeted system.
The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending crafted web requests with a directory traversal sequence to the system. An exploit could allow the attacker to access a specific file that is not normally exposed through the web interface.
Functional code that exploits this vulnerability is publicly available.
Cisco has confirmed the vulnerability but software updates are not available.
To exploit the vulnerability, the attacker must send crafted HTTP requests to the affected system. Depending on the network configuration, the attacker would likely need access to trusted, internal networks. This access requirement could limit the likelihood of a successful attack.