{"vuid":"VU#555984","idnumber":"555984","name":"Avigilon Control Center is vulnerable to path traversal","keywords":["path traversal"],"overview":"The Avigilon Control Center (ACC) is a server software for security and surveillance systems. The ACC Server is vulnerable to a path traversal attack, allowing an attacker to access any file on the server.","clean_desc":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2860 The /help/ path of a URL to an ACC Server is improperly parsed, allowing an attacker to perform a path traversal to access any file on the underlying system.","impact":"An unauthenticated remote attacker may access any file on the underlying system running ACC Server.","resolution":"Apply an update Avigilon has released updates addressing this issue in affected products; users are encouraged to update as soon as possible. For ACC Server version 5, please update to 5.4.2.22 or later. For ACC Server version 4, please update to 4.12.0.54 or later.","workarounds":"","sysaffected":"","thanks":"Thanks to Jürgen Bilberger for reporting this vulnerability, and to Avigilon for quickly addressing this issue.","author":"This document was written by Garret Wassermann.","public":["h","t","t","p",":","/","/","a","v","i","g","i","l","o","n",".","c","o","m","/","s","u","p","p","o","r","t","-","a","n","d","-","d","o","w","n","l","o","a","d","s","/","f","o","r","-","s","o","f","t","w","a","r","e","/","s","o","f","t","w","a","r","e","-","u","p","d","a","t","e","s","-","a","n","d","-","d","o","w","n","l","o","a","d","s","/"],"cveids":["CVE-2015-2860"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-05-07T19:29:31Z","publicdate":"2015-06-08T00:00:00Z","datefirstpublished":"2015-06-10T16:09:44Z","dateupdated":"2015-06-10T16:09:44Z","revision":30,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:N/A:N","cvss_temporalscore":"6.1","cvss_environmentalscore":"4.57255757448","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}