漏洞信息详情
Cisco Integrated Management Controller Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data 授权问题漏洞
- CNNVD编号:CNNVD-201908-1723
- 危害等级: 超危
- CVE编号: CVE-2019-1937
- 漏洞类型: 授权问题
- 发布时间: 2019-08-21
- 威胁类型: 远程
- 更新时间: 2019-09-05
- 厂 商:
- 漏洞来源: independent securi...
漏洞简介
Cisco Integrated Management Controller (IMC) Supervisor等都是美国思科(Cisco)公司的产品。Cisco Integrated Management Controller (IMC) Supervisor是一套机架式服务器集中管理系统。Cisco UCS Director是一套私有云基础架构即服务(IaaS)的异构平台。Cisco UCS Director Express for Big Data是一套针对大数据集群的基础架构统一管理平台。
Cisco Integrated Management Controller (IMC) Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data中的Web管理界面存在授权问题漏洞,该漏洞源于在身份验证过程中,程序没有充分验证请求头。 远程攻击者可通过发送恶意的请求利用该漏洞获取有效的会话令牌,获取受影响设备的全部管理员权限。以下产品及版本受到影响:Cisco IMC Supervisor 2.2.0.3版本至2.2.0.6版本;Cisco UCS Director 6.6.0.0版本,6.6.1.0版本,6.7.0.0版本,6.7.1.0版本;Cisco UCS Director Express for Big Data 3.6版本,3.7.0.0版本,3.7.1.0版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby
参考网址
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2019/Aug/36
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Aug/49
来源:MISC
链接:https://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.HTML
来源:MISC
链接:https://packetstormsecurity.com/files/154308/Cisco-UCS-Director-Unauthenticated-Remote-Code-Execution.HTML
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-bo
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-cimc-cli-inject
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1865
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-infodisc
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilege
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privescal
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-imc-dos
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-usercred
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-dos
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Cisco-UCS-Director-three-vulnerabilities-30177
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.HTML
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-1937
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3212/
受影响实体
暂无
补丁
- Cisco Integrated Management Controller Supervisor、Cisco UCS Director和Cisco UCS Director Express for Big Data 授权问题漏洞的修复措施
![weinxin](http://zone.ci/zone_ci_images/zone.ci.png)
评论