Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2658963-C679-43C8-9A39-AC84F5EEE343", "versionEndIncluding": "9.0\\(1\\)", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:3.0:sr1:*:*:*:*:*:*", "matchCriteriaId": "B3FA84E2-8B3B-4C19-B135-535E58DF3847", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:3.0:sr2:*:*:*:*:*:*", "matchCriteriaId": "44B2F5F0-DD35-463C-B73C-00B7911BCDD5", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:3.6\\(10\\):es01:*:*:*:*:*:*", "matchCriteriaId": "36E1A7F5-4BA6-4C10-A85B-BB666C457BFC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B1D46F0-DEC9-418B-8973-6EC44201B0B8", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AE565A29-2DC7-4F4F-8E47-CB404E0AA5AF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:4.0\\(2\\):sr1:*:*:*:*:*:*", "matchCriteriaId": "C54FFF1F-2991-46EA-90C9-319F47663699", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "270E39D1-6F71-4C6F-AE91-B0A86057CCCF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6796545D-C15C-4ADA-8491-31FC26560809", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9E51515-7E70-4199-8C99-D45F21D989B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8805E471-95E0-45DF-A346-15F10EB281B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6435E484-D475-49C6-8649-7BBD3728B08F", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:unified_customer_voice_portal:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D6A6517-6F93-4B4B-91CB-9777EBAFF922", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The log viewer in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly validate an unspecified parameter, which allows remote attackers to read arbitrary files via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38372."}, {"lang": "es", "value": "El lector de log en Cisco Unified Customer Voice Portal (CVP) Software antes de v9.0.1 ES v11 no valida correctamente un par\u00e1metro sin especificar, lo que permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de peticiones modificadas (1) HTTP \u00f3 (2) HTTPS, tambi\u00e9n conocido como Bug ID CSCub38372."}], "id": "CVE-2013-1223", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-05-09T12:31:19.207", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}