Description
Directory traversal vulnerability in cwhp/auditLog.do in the Homepage Auditing component in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, aka Bug ID CSCto35577.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Sense of Security · textremotewindows
https://www.exploit-db.com/exploits/17304
exploitdb
WRITEUP
VERIFIED
by Sense of Security · textwebappsjava
https://www.exploit-db.com/exploits/35781
References (5)
Core 5
Core References
Exploit, URL Repurposed x_refsource_misc
http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf
Exploit mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/17304
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/67525
Various Sources x_refsource_confirm
http://tools.cisco.com/security/center/viewAlert.x?alertId=23089
Scores
EPSS
0.3476
EPSS Percentile
97.0%
Details
CWE
CWE-22
Status
published
Products (11)
cisco/ciscoworks_common_services
1.0
cisco/ciscoworks_common_services
2.2
cisco/ciscoworks_common_services
3.0
cisco/ciscoworks_common_services
3.0.3
cisco/ciscoworks_common_services
3.0.4
cisco/ciscoworks_common_services
3.0.5
cisco/ciscoworks_common_services
3.0.6
cisco/ciscoworks_common_services
3.1
cisco/ciscoworks_common_services
3.1.1
cisco/ciscoworks_common_services
3.2
... and 1 more
Published
May 20, 2011
Tracked Since
Feb 18, 2026