Lucene search

K
saintSAINT CorporationSAINT:D900A97324C56830CEAF51652E312989
HistoryMar 24, 2016 - 12:00 a.m.

Bash environment variable command injection in Cisco UCS Manager

2016-03-2400:00:00
SAINT Corporation
my.saintcorporation.com
107

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

Added: 03/24/2016
CVE: CVE-2014-6278
BID: 70166

Background

GNU Bash (Bourne Again SHell) is a command shell commonly used on Linux and Unix systems.

Cisco UCS Manager is a product for management of Cisco UCS and Cisco HyperFlex infrastructure.

Problem

The Bash shell executes commands injected after function definitions contained in environment variables. This could be used by a remote attacker to cause arbitrary commands to execute when Cisco UCS Manager handles specially crafted HTTPS requests.

Resolution

Upgrade to Cisco UCS Manager 3.0(1d), 2.2(3b), 2.2(2e), 2.2(1f), 2.1(3f), or 2.0(5g).

References

<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash&gt;

Limitations

Exploit works on Cisco UCS Manager 2.1(1b).

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%