A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: cisco

Published: 2018-10-17T00:00:00

Updated: 2018-10-20T09:57:01

Reserved: 2017-11-27T00:00:00


Link: CVE-2018-0420

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-10-17T22:29:00.457

Modified: 2023-02-03T19:21:26.437


Link: CVE-2018-0420

JSON object: View

cve-icon Redhat Information

No data.

CWE