Intrusion Prevention

Polycom.a_getlog.cgi.Directory.Traversal

Description

This indicates an attack attempt against a Directory Traversal vulnerability in Polycom Products.
The vulnerability is due to the user input filter failing to properly sanitize the name parameter value that is passed to "a_getlog.cgi". An attacker may browse arbitrary file by supplying an injection string through the URL.

Affected Products

Polycom Web Management Interface G3/HDX 8000 HD
Polycom Linux Development Platform 2.14.g3
Polycom HDX Video End Points 2.6
Polycom HDX 8000 0
Polycom Durango 2.6 build 4740
Polycom Durango 2.6

Impact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Recommended Actions

Refer to the vendor's web site for suggested workaround.
http://www.polycom.com/index.html?ss=false