CVE-2006-1961
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/04/2006
Last modified:
03/04/2025
Description
Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:user_registration_tool:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:express:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:express:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/19736
- http://secunia.com/advisories/19739
- http://secunia.com/advisories/19741
- http://securitytracker.com/id?1015965=
- http://www.assurance.com.au/advisories/200604-cisco.txt
- http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
- http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml
- http://www.osvdb.org/24813
- http://www.securityfocus.com/archive/1/431367/30/5490/threaded
- http://www.securityfocus.com/archive/1/431371/30/5490/threaded
- http://www.securityfocus.com/bid/17609
- http://www.vupen.com/english/advisories/2006/1434
- http://www.vupen.com/english/advisories/2006/1435
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25884
- http://secunia.com/advisories/19736
- http://secunia.com/advisories/19739
- http://secunia.com/advisories/19741
- http://securitytracker.com/id?1015965=
- http://www.assurance.com.au/advisories/200604-cisco.txt
- http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
- http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml
- http://www.osvdb.org/24813
- http://www.securityfocus.com/archive/1/431367/30/5490/threaded
- http://www.securityfocus.com/archive/1/431371/30/5490/threaded
- http://www.securityfocus.com/bid/17609
- http://www.vupen.com/english/advisories/2006/1434
- http://www.vupen.com/english/advisories/2006/1435
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25884



