Executive Summary
Summary | |
---|---|
Title | Cisco Prime License Manager SQL Injection Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20181128-plm-sql-inject | First vendor Publication | 2018-11-28 |
Vendor | Cisco | Last vendor Modification | 2018-11-28 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the web framework code of Cisco Prime License Manager (PLM) could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted HTTP POST requests that contain malicious SQL statements to an affected application. A successful exploit could allow the attacker to modify and delete arbitrary data in the PLM database or gain shell access with the privileges of the postgres user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJb/rw/XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczihYP/3zj9AddYyvli7JhZTTzmqXrAP2z /9V6I0yRUuiMaHJnNITd/wtvcdcgTNy8MoRyMkcmck6hSZcnhY3WM352xjr86t1E LUohs/JGfgGDRFnw3iPnhOdzuIS7TUcUueACVZgFTUcblebuNEp96/xy0s4sNELU 2wHoY06N3c/Ai7RK/1qwtwaqCyl+a4puyO2cncNWIDLVxop+MRljzd1L1dKu624u dZei7ITLSp4Cbd+mqrY6e6H+1ubreWw84egZTjNOgWWq3MEHN3BfOhjO526rlMvK peUB3d3q7lNHi6vgswLGv5nT9pZ9fj9viq3rSwW2IQXDRvOD1k7atWyi0Rw9tmUm T02QTiSU4JqeQp6mXkgl0JiikPsybFuiC285YQ/syYYrNnKVshq3K3J3rEDL6lxH PqfPV2zzRJUO5xp4F/enKyj8MwW6yBCKWQ9Ok3AyMXKzKj45K/XGT6ARR7Dv+QIo gMxSlQnuLn9v6Hq9+577bzkPcHEY7qfLx7M6VB9Z6ZE21s+BUlFqST/i0+39Js0U iIqrcLrP4/aUdsHIggozVTlhRkUn+DmVwO7QjwT1DNPgwZ4gcm/QS1pfxx3qsbQ/ C37Yj5MjLk7U7VlVJNkZ8lSOpEbNjH1tiw3msrgIjFUKms/xo/sh56/OFe6bpOFi jmFXMn+/TsvpFyjL =D7I5 END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Prime License Manager SQL injection attempt RuleID : 48455 - Revision : 1 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco Prime License Manager SQL injection attempt RuleID : 48454 - Revision : 1 - Type : SERVER-WEBAPP |
Alert History
Date | Informations |
---|---|
2020-12-05 21:23:46 |
|
2018-12-11 00:21:16 |
|
2018-11-28 21:22:03 |
|
2018-11-28 17:18:16 |
|