Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q3jq-p92h-xjrr

Опубликовано: 17 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.

EPSS

Процентиль: 24%
0.0008
Низкий

8.1 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.1
nvd
больше 2 лет назад

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.

CVSS3: 8.1
fstec
больше 2 лет назад

Уязвимость веб-интерфейса управления систем обработки вызовов Cisco Unified Communications Manager и Cisco Unified Communications Manager Session Management Edition (SME), позволяющая нарушителю получить доступ на чтение или изменение сведений в базе данных

EPSS

Процентиль: 24%
0.0008
Низкий

8.1 High

CVSS3

Дефекты

CWE-89