A vulnerability in the SQL database interface for Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a blind SQL injection attack. The vulnerability is due to a failure to validate user-supplied input used in SQL queries that bypass protection filters. An attacker could exploit this vulnerability by sending crafted URLs that include SQL statements. An exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data. Cisco Bug IDs: CSCvb58973.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cer | Vendor Advisory |
http://www.securitytracker.com/id/1039287 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/100653 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-09-07 14:29
Updated : 2019-10-09 16:22
NVD link : CVE-2017-12227
Mitre link : CVE-2017-12227
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
cisco
- emergency_responder