Polycom.a_getlog.cgi.Directory.Traversal
Description
This indicates an attack attempt against a Directory Traversal vulnerability in Polycom Products.
The vulnerability is due to the user input filter failing to properly sanitize the name parameter value that is passed to "a_getlog.cgi". An attacker may browse arbitrary file by supplying an injection string through the URL.
Affected Products
Polycom Web Management Interface G3/HDX 8000 HD
Polycom Linux Development Platform 2.14.g3
Polycom HDX Video End Points 2.6
Polycom HDX 8000 0
Polycom Durango 2.6 build 4740
Polycom Durango 2.6
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Refer to the vendor's web site for suggested workaround.
http://www.polycom.com/index.html?ss=false
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2018-09-21 | 13.455 | Sig Added |