SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Unified Communications Domain Manager Vendors:   Cisco
Cisco Unified Communications Domain Manager Input Validation Flaw Lets Remote Authenticated Users Inject SQL Commands
SecurityTracker Alert ID:  1038632
SecurityTracker URL:  http://securitytracker.com/id/1038632
CVE Reference:   CVE-2017-6668   (Links to External Site)
Date:  Jun 8 2017
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Vendor Confirmed:  Yes  
Version(s): 8.1(7)ER1
Description:   A vulnerability was reported in Cisco Unified Communications Domain Manager. A remote authenticated user can inject SQL commands.

The web-based GUI does not properly validate user-supplied input. A remote authenticated user can supply a specially crafted parameter value to execute SQL commands on the underlying database. This can be exploited to obtain but not modify certain data from the database.

The vendor has assigned bug IDs CSCvc52784 and CSCvc97648 to this vulnerability.

Impact:   A remote authenticated user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-cucm2

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-cucm2 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-cucm2

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC