Cisco WAAS Mobile Server ReportReceiver CAB Processing Remote Code Execution Vulnerability

ID ZDI-13-276
Type zdi
Reporter Andrea Micalizzi aka rgod
Modified 2013-06-22T00:00:00


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CISCO WAAS Mobile Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of CAB files uploaded through ReportReceiver. By uploading a crafted CAB file, an attacker is able to add a hostile web page to the web server. Using this, an attacker is able to run arbitrary code as either DefaultAppPool or NetworkService, depending on the operating system version.