Intrusion Prevention
Polycom.a_getlog.cgi.Directory.Traversal
Description
This indicates an attack attempt against a Directory Traversal vulnerability in Polycom Products.
The vulnerability is due to the user input filter failing to properly sanitize the name parameter value that is passed to "a_getlog.cgi". An attacker may browse arbitrary file by supplying an injection string through the URL.
Affected Products
Polycom Web Management Interface G3/HDX 8000 HD
Polycom Linux Development Platform 2.14.g3
Polycom HDX Video End Points 2.6
Polycom HDX 8000 0
Polycom Durango 2.6 build 4740
Polycom Durango 2.6
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Refer to the vendor's web site for suggested workaround.
http://www.polycom.com/index.html?ss=false