A vulnerability in Cisco Unified Communications Manager 10.5(2.10000.5), 11.0(1.10000.10), and 11.5(1.10000.6) could allow an authenticated, remote attacker to conduct a blind SQL injection attack. The vulnerability is due to a failure to validate user-supplied input used in SQL queries that bypass protection filters. An attacker could exploit this vulnerability by sending crafted URLs that include SQL statements. An exploit could allow the attacker to modify or delete entries in some database tables, affecting the integrity of the data. Cisco Bug IDs: CSCve13786.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ucm | Vendor Advisory |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13786 | Vendor Advisory |
http://www.securitytracker.com/id/1039063 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/100121 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-06 23:29
Updated : 2019-10-09 16:29
NVD link : CVE-2017-6757
Mitre link : CVE-2017-6757
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
cisco
- unified_communications_manager