Cisco Bug: CSCuo51042 - CDSM:HTTP TRACE/TRACK Method Allowed - vulnerablity reported in Nessus
Jun 18, 2020
- Cisco Content Delivery Engine Series
Known Affected Releases
Symptoms: A vulnerability in the HTTP TRACK/TRACE method of the Cisco Enterprise Content Delivery System (ECDS) could allow an unauthenticated, remote attacker to have ''read'' access to part of information stored in the affected system. The vulnerability is due to an affected Web Server. An attacker could exploit this vulnerability by using TRACK to read the contents of the HTTP headers that are returned in the response. Conditions: Devices running an affected version of the Cisco Enterprise Content Delivery System (ECDS).
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases