You are here
Home > Preporuke > Ranjivost Cisco Prime Collaboration Provisioning aplikacije

Ranjivost Cisco Prime Collaboration Provisioning aplikacije

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Prime Collaboration Provisioning SQL Injection Vulnerability

Advisory ID: cisco-sa-20180606-prime-sql

Revision: 1.0

For Public Release: 2018 June 6 16:00 GMT

Last Updated: 2018 June 6 16:00 GMT

CVE ID(s): CVE-2018-0320

CVSS Score v(3): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the web framework code of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to execute arbitrary SQL queries.

The vulnerability is due to a lack of proper validation on user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-sql [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-sql”]

—–BEGIN PGP SIGNATURE—–

iQJ5BAEBAgBjBQJbGAZYXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50
IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly
dEBjaXNjby5jb20+AAoJEJa12PPJBfczyf4P/3fwVX6CUUgmQLXRYUrIYCVIcKj6
Zmzi68Vk4TzOLA9/vJ17PhWFgR9cxClt29x8/zlnvxZT5BqKrGGbPmDR/2hTrWOq
Zgul4cExWmwCAKXrxjoMzQn1KtxJw44zc+dYnpQXuvXA6J0TTVGUbQKt5IcdEQIi
zadytpKXW3PChXWav+pUfGHn7M5sVHVGiNgku34SIt4BHqTIvRRE0nK/M7BWaP2p
rk9lfuoBXbq2hDUILfrQ5nxMxg+nzNrbDnbCWzOY7hqsFYfX71qNhptLT/m/wyae
uJsmgqKFLzli0cV2KmrS9JGpWpLb4G4x/ibl93M7nsma48BHn81fzpy4f0/nBopJ
qaWRiFNYRk1qJADcSW8q1i8hUs/f95iwRKxHsQ0lTWAGSjWVXNCCTLVVGfZqAZox
4Lz8nbrJ/GrSnc9ZGpy96GeQjRC8tcwR87S8vli3qIjnzqFYrQfv8d2vGtUPfW92
8gOnzaiiGNVtfW5kJ1MnkjtQlkQ2XIjKjNpwDbHeaZih+p0VArjJoaj9llZn57TY
s1cl1DCwGHBkQgp7XNPS3/u/NAM2NQ+P0jm5rqZI7QnbbF+XCycdUmcEENSBAxEB
g5zU+DlfD3dFlNx6Nkwa3dYNGLJq1gdMe//Jipq1Qnsj+9bVbpKUCnLWvDn0/0WP
qY/+hHXUiHjW6p+R
=c+wF
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorAndrej Sefic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top