Lucene search

K
ciscoCiscoCISCO-SA-20150918-CVE-2015-6299
HistorySep 18, 2015 - 8:25 p.m.

Cisco Unity Connection Web Interface SQL Injection Vulnerability

2015-09-1820:25:11
tools.cisco.com
26

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.001

Percentile

41.4%

A vulnerability in the web interface of Cisco Unity Connection (UC) could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries.

The vulnerability is due to a lack of input validation on user-supplied input in SQL queries. An attacker could exploit this vulnerability by entering a maliciously crafted value containing SQL commands as an HTTP POST request parameter. An exploit could allow the attacker to determine the presence of certain values in the database.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker must
authenticate to the targeted device. This access requirement may reduce
the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code
exists; however, the code is not known to be publicly available.

This vulnerability was reported to Cisco by Paul Heneghan from NCIA/NCIRC.

Affected configurations

Vulners
Node
ciscounity_connectionMatchany
OR
ciscounity_connectionMatchany
VendorProductVersionCPE
ciscounity_connectionanycpe:2.3:a:cisco:unity_connection:any:*:*:*:*:*:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.001

Percentile

41.4%

Related for CISCO-SA-20150918-CVE-2015-6299