A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successful exploit could allow the attacker to bypass access controls and gain unauthorized access to the Device Manager application, which provides access to network devices managed by the system.
References
| Link | Resource |
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-01-20 20:15
Updated : 2023-11-07 03:27
NVD link : CVE-2021-1272
Mitre link : CVE-2021-1272
CVE.ORG link : CVE-2021-1272
JSON object : View
Products Affected
cisco
- data_center_network_manager
CWE
CWE-918
Server-Side Request Forgery (SSRF)
