5.5
CVSSv2

CVE-2013-5517

Published: 02/10/2013 Updated: 17/10/2013
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

A vulnerability in the web framework of Cisco Unified Communications Domain Manager could allow an authenticated, remote malicious user to impact the integrity and availability of the affected system by executing arbitrary SQL queries. The vulnerability is due to a failure to validate user-supplied input used in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs including by SQL statements. An exploit could allow the malicious user to modify or delete entries in some database tables, affecting the integrity and availability of some functions. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit the vulnerability, the attacker must be able to authenticate to a targeted device to submit malicious SQL statements. In addition, the attacker may need access to trusted, internal networks in which the targeted device may reside. These access requirements could reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco unified communications domain manager -

Vendor Advisories

A vulnerability in the web framework of Cisco Unified Communications Domain Manager could allow an authenticated, remote attacker to impact the integrity and availability of the affected system by executing arbitrary SQL queries The vulnerability is due to a failure to validate user-supplied input used in SQL queries An attacker could exploit th ...