A vulnerability in the web framework of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct an SQL injection attack against an affected system. The vulnerability exists because the affected software fails to validate user-supplied input in certain SQL queries that bypass protection filters. An attacker could exploit this vulnerability by submitting crafted HTTP requests that contain malicious SQL statements to an affected system. A successful exploit could allow the attacker to determine the presence of certain values in the database of the affected system. Cisco Bug IDs: CSCvg74810.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102958 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040341 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cucm | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-02-08 07:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-0120
Mitre link : CVE-2018-0120
CVE.ORG link : CVE-2018-0120
JSON object : View
Products Affected
cisco
- unified_communications_manager
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')