Lucene search

K
ciscoCiscoCISCO-SA-20160621-PCD
HistoryJun 21, 2016 - 1:00 p.m.

Cisco Prime Collaboration Deployment SQL Injection Vulnerability

2016-06-2113:00:00
tools.cisco.com
16

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

31.1%

A vulnerability in the interface of the Cisco Prime Collaboration Deployment SQL database could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries.

The vulnerability is due to a lack of input validation for user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to an affected system. A successful exploit could allow the attacker to determine the presence of certain values in the database.

For additional information, please refer to https://www.owasp.org/index.php/SQL_Injection[“https://www.owasp.org/index.php/SQL_Injection”].

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160621-pcd”]

Affected configurations

Vulners
Node
ciscoprime_collaboration_deploymentMatchany
OR
ciscoprime_collaboration_deploymentMatchany
VendorProductVersionCPE
ciscoprime_collaboration_deploymentanycpe:2.3:a:cisco:prime_collaboration_deployment:any:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

31.1%

Related for CISCO-SA-20160621-PCD