Executive Summary
Summary | |
---|---|
Title | Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities |
Informations | |||
---|---|---|---|
Name | cisco-sa-20190515-pi-sqlinject | First vendor Publication | 2019-05-15 |
Vendor | Cisco | Last vendor Modification | 2019-05-15 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5.5 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries. These vulnerabilities exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit these vulnerabilities by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJc3Dq1XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczLmIQAJgDMDkcNBXNZRcRo9pq8ue3mrz9 fxw+Avk2uaBZxWydz11SUVdCGVzAXMgooNZ3NQmISiiqvT40VQVDMdN2QK0IdUJH oCPV05/xFQywyB9loV6F8hLOyg/6XXSgVIYzHZdJiHTPbrrodTooRSS8CuRXPco6 6DAWDKblAB+n1WsmEOo4SGaX9oUAXcaLv/nITS9e+YBAqXCOyamUkPhA1nQFUccf 1lJZS2oiE+fgQu15jHs9B2IuHxrvnpi99c0i4SEQH/PfiswQyyIOwZ7rI9o1+P7U FIBHmq0QA0h23elECaurkeAaAqVB9tSINv8MJzGIIWp/5Ybaf/gI7hYXSM7QBxTP Qr7wgwwa77IPTx0yzkTRkCY08w1jF+fC/2bfpHbcd+CYCkyNsrtu6+xXKIoROQrk XkJNNi6FPCbxbu2HIZjhsnxWWSNyCQfxYnF0PBqz3tLKLoz9/t7zirpdysbW3V4i LvjQL2hhP18YMbR592taKrAk5OY8Hm4GZFz9DRNXWupYAr4ick0owrqXEX6+wY0B hZOrVTRzg/f41FUvxKvFi2ZyucqqHl72r+wjNEGjIEDMFzktHDRQUDeehSn7gjTC nPm3C1ASqYDWYn9IjmhRLpOiFeXupJ7kIHS1jEKniqgWYEv/OdlmmHyXB3KkKkxU Jf3Iwhk5yX7Vygly =mwDd END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Prime Infrastructure SQL injection attempt RuleID : 49985 - Revision : 3 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco Prime Infrastructure SQL injection attempt RuleID : 49984 - Revision : 3 - Type : SERVER-WEBAPP |
Alert History
Date | Informations |
---|---|
2020-12-05 21:23:46 |
|
2019-05-21 00:21:32 |
|
2019-05-16 09:21:38 |
|
2019-05-15 21:18:32 |
|