search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco Collaboration Server (CCS) ServletExec allows arbitrary file uploading

Vulnerability Note VU#718896

Original Release Date: 2004-07-09 | Last Revised: 2004-07-09

Overview

There is a vulnerability in the ServletExec subcomponent of the Cisco Collaboration Server (CCS) that could allow an attacker to upload arbitrary files to the server.

Description

The Cisco Collaboration Server (CCS) is designed to provide interactive customer support (web page sharing, application sharing, text chat, etc.) through a web browser. There is a vulnerability in the UploadServlet of the ServletExec subcomponent of CCS. This vulnerability could allow a remote attacker to upload arbitrary files to the server and subsequently execute those files.

As noted in the Cisco Advisory, you can test your CCS to determine if it is vulnerable by attempting to load the following URL:

http://<ccsservername>/servlet/UploadServlet

If a NullPointerException is returned, the system is vulnerable. If a "Page Not Found" error is returned, your system is not vulnerable.

Impact

A remote attacker could upload arbitrary files to the CCS and potentially gain administrative privileges.

Solution

Apply patch
Cisco has released an advisory "Cisco Collaboration Server Vulnerability" to address this issue. For more information on applying patches, please refer to the "Software Versions and Fixes" section of the Cisco Advisory.


Manually remove UploadServlet class
According to the Cisco Advisory, users may perform the following steps to manually apply the patch:

Manual Instructions to Patch CCS 3.x

    1. Stop Internet Information Server (IIS).
    2. Run Winzip or your favorite zip utility and open ServletExec22.jar in the C:\Program Files\ew atlanta\servletexec ISAPI\lib directory.
    3. Delete UploadServlet.class.
    4. Save ServletExec22.jar back to its original location and exit Winzip.
    5. Restart IIS.

    Manual Instructions to Patch CCS 4.x
      1. Stop Internet Information Server (IIS).
      2. Run Winzip or your favorite zip utility and open ServletExec30.jar in the C:\Program Files\ew atlanta\servletexec ISAPI\lib directory.
      3. Delete UploadServlet.class.
      4. Save ServletExec30.jar back to its original location and exit Winzip.
      5. Restart IIS.

      CCS 5.x is not vulnerable and these manual instructions do not apply.

      Vendor Information

      718896
       

      Cisco Systems Inc. Affected

      Updated:  July 09, 2004

      Status

      Affected

      Vendor Statement

      We have not received a statement from the vendor.

      Vendor Information

      The vendor has not provided us with any further information regarding this vulnerability.

      Addendum

      Please refer to the Cisco Advisory "Cisco Collaboration Server Vulnerability".

      If you have feedback, comments, or additional information about this vulnerability, please send us email.


      CVSS Metrics

      Group Score Vector
      Base
      Temporal
      Environmental

      References

      Acknowledgements

      This vulnerability was reported by the Cisco Systems Product Security Incident Response Team (PSIRT).

      This document was written by Damon Morda.

      Other Information

      CVE IDs: None
      Severity Metric: 8.93
      Date Public: 2004-06-30
      Date First Published: 2004-07-09
      Date Last Updated: 2004-07-09 14:42 UTC
      Document Revision: 12

      Sponsored by CISA.