Lucene search

K
zdiNenad StojanovskiZDI-13-067
HistoryMay 10, 2013 - 12:00 a.m.

Cisco Clean Access Manager filter SQL Injection Remote Code Execution Vulnerability

2013-05-1000:00:00
Nenad Stojanovski
www.zerodayinitiative.com
14

EPSS

0.009

Percentile

82.7%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Clean Access Manager. Authentication is not required to exploit this vulnerability. The specific flaw is in the handling of filter URL parameters when constructing SQL database queries. By specially crafting URL parameters, it is possible to influence the SQL queries to gain remote code execution on the affected system.

EPSS

0.009

Percentile

82.7%