Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Cisco Prime Collaboration Provisioning Authenticated SQL Injection Vulnerability
Informations
Name cisco-sa-20171101-cpcp First vendor Publication 2017-11-01
Vendor Cisco Last vendor Modification 2017-11-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:N)
Cvss Base Score 5.5 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the web framework code for the SQL database interface of the Cisco Prime Collaboration Provisioning application could allow an authenticated, remote attacker to impact the confidentiality and integrity of the application by executing arbitrary SQL queries. The attacker could read or write information from the SQL database.

The vulnerability is due to a lack of proper validation on user-supplied input within SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application. An exploit could allow the attacker to determine the presence of certain values and write malicious input in the SQL database. The attacker would need to have valid user credentials.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp"]

BEGIN PGP SIGNATURE

iQKBBAEBAgBrBQJZ+fHYZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHkAhw/+PwA+9RmPow9eWunn WJ+L7mtYh9vZKYPNy0LYDcqGu65YzYxW5m9lVaLs7+ScdJMRYSZJBvQ6CV0rmIid WbZCS5ipYyt0CAq0ernnKBk9r3Zs8gglPDSjlx13of2Fa3rfoZWGrovRADD/PPYA 2MU2XVvZAhsfKfXoaizR6BuW1UiS0YwABvy/Sg6pfy0muLrjpnOypl/h3+X1eRQ/ aEhvh320xvp/PQMw1Cr4xKVmpz3QSppFJC/Z0BlZRpN69jnF4BbdTDpcBiHmOype o5jy/YCLSAcImF2d1cldacbGkBAbV3XMlUNHGqyRzLsydvVadLBPPDjsTHE6z3Bi K0tKPees2nqg977QjNyIMHWyFBzuYkz7v8abXnMRRbImu/S/xxETL2LZ0jcijCD +GOKVzluEHrXGz/+NOxxK6ZS2yPEYuSWiCBfJkFF908iXYxxJN+3JtNH85LB5ByAd izXr94sgi5yRv5k5VUglwwRKx5e9xD9D4NyyzIfTmaNNliCSUl0FjP5j8aev3y3n n+OFQgTkkzNwoLwVRzw/r/8sVQuq+VTU71WJDPWlMRbM6BCNuUURs8Wbk+gfCZsg x+AW7JL5ebwXoFMPNBARPTj5kZz42pOlewouUUqlHn6XIXjm64vfOxyPQXyM75S8 ejGswYHGEDJwZiSg2+5rQdbQzjA= =yglx END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 18

Snort® IPS/IDS

Date Description
2017-11-02 Cisco Prime Collaboration Provisioning pmclasschooser.xml SQL injection attempt
RuleID : 44723 - Revision : 1 - Type : SERVER-WEBAPP
2017-11-02 Cisco Prime Collaboration Provisioning pmclasschooser.xml SQL injection attempt
RuleID : 44722 - Revision : 1 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2017-11-08 Name : The remote network management server is affected by a SQL injection vulnerabi...
File : cisco_prime_cp_sa-20171101-cpcp.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2017-11-21 21:24:38
  • Multiple Updates
2017-11-09 13:25:12
  • Multiple Updates
2017-11-02 21:25:40
  • Multiple Updates
2017-11-01 21:22:45
  • First insertion