Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Cisco Prime License Manager SQL Injection Vulnerability
Name cisco-sa-20181128-plm-sql-inject First vendor Publication 2018-11-28
Vendor Cisco Last vendor Modification 2018-11-28
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the web framework code of Cisco Prime License Manager (PLM) could allow an unauthenticated, remote attacker to execute arbitrary SQL queries.

The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted HTTP POST requests that contain malicious SQL statements to an affected application. A successful exploit could allow the attacker to modify and delete arbitrary data in the PLM database or gain shell access with the privileges of the postgres user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject"]


iQJ5BAEBAgBjBQJb/rw/XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczihYP/3zj9AddYyvli7JhZTTzmqXrAP2z /9V6I0yRUuiMaHJnNITd/wtvcdcgTNy8MoRyMkcmck6hSZcnhY3WM352xjr86t1E LUohs/JGfgGDRFnw3iPnhOdzuIS7TUcUueACVZgFTUcblebuNEp96/xy0s4sNELU 2wHoY06N3c/Ai7RK/1qwtwaqCyl+a4puyO2cncNWIDLVxop+MRljzd1L1dKu624u dZei7ITLSp4Cbd+mqrY6e6H+1ubreWw84egZTjNOgWWq3MEHN3BfOhjO526rlMvK peUB3d3q7lNHi6vgswLGv5nT9pZ9fj9viq3rSwW2IQXDRvOD1k7atWyi0Rw9tmUm T02QTiSU4JqeQp6mXkgl0JiikPsybFuiC285YQ/syYYrNnKVshq3K3J3rEDL6lxH PqfPV2zzRJUO5xp4F/enKyj8MwW6yBCKWQ9Ok3AyMXKzKj45K/XGT6ARR7Dv+QIo gMxSlQnuLn9v6Hq9+577bzkPcHEY7qfLx7M6VB9Z6ZE21s+BUlFqST/i0+39Js0U iIqrcLrP4/aUdsHIggozVTlhRkUn+DmVwO7QjwT1DNPgwZ4gcm/QS1pfxx3qsbQ/ C37Yj5MjLk7U7VlVJNkZ8lSOpEbNjH1tiw3msrgIjFUKms/xo/sh56/OFe6bpOFi jmFXMn+/TsvpFyjL =D7I5 END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 4

Snort® IPS/IDS

Date Description
2020-12-05 Cisco Prime License Manager SQL injection attempt
RuleID : 48455 - Revision : 1 - Type : SERVER-WEBAPP
2020-12-05 Cisco Prime License Manager SQL injection attempt
RuleID : 48454 - Revision : 1 - Type : SERVER-WEBAPP

Alert History

If you want to see full details history, please login or register.
Date Informations
2020-12-05 21:23:46
  • Multiple Updates
2018-12-11 00:21:16
  • Multiple Updates
2018-11-28 21:22:03
  • Multiple Updates
2018-11-28 17:18:16
  • First insertion