ID

VAR-200708-0511


CVE

CVE-2007-4634


TITLE

Cisco CUCM In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-002570

DESCRIPTION

Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands via the lang variable to the (1) user or (2) admin logon page, aka CSCsi64265. Call Manager is prone to a sql-injection vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Cisco CallManager / CUCM Cross-Site Scripting and SQL Injection SECUNIA ADVISORY ID: SA26641 VERIFY ADVISORY: http://secunia.com/advisories/26641/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting, Manipulation of data WHERE: >From remote SOFTWARE: Cisco Unified Communications Manager 4.x http://secunia.com/product/5363/ Cisco Unified CallManager 4.x http://secunia.com/product/12534/ Cisco Unified CallManager 3.x http://secunia.com/product/2805/ DESCRIPTION: Some vulnerabilities have been reported in Cisco Unified CallManager and Unified Communications Manager (CUCM), which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. 1) Input passed to unspecified parameters to the admin or user logon pages is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Input passed to unspecified parameters to the admin or user logon pages is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerabilities affect Cisco CallManager and Unified Communications Manager prior to the following versions: * 3.3(5)sr2b * 4.1(3)sr5 * 4.2(3)sr2 * 4.3(1)sr1 SOLUTION: Update to version 3.3(5)sr2b, 4.1(3)sr5, 4.2(3)sr2, or 4.3(1)sr1. See vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: The vendor credits Gama SEC and Elliot Kendall from Brandeis University. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00808ae327.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4634 // JVNDB: JVNDB-2007-002570 // BID: 81602 // VULHUB: VHN-27996 // PACKETSTORM: 58971

AFFECTED PRODUCTS

vendor:ciscomodel:unified communications managerscope:eqversion:4.1\(3\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:3.3\(5\)sr1

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.1\(3\)sr1

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:3.3\(5\)sr2a

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.2

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.1\(3\)sr4

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.2.1

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.1\(3\)sr3

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:3.3\(5\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.1\(3\)sr2

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:4.3

Trust: 1.3

vendor:ciscomodel:call managerscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:3.3\(5\)sr2a

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:4.2.2

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.1\(3\)sr4

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.3\(1\)

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2\(3\)sr1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:4.3\(1\)

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.3

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:3.3\(5\)sr1

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:3.3\(5\)sr2

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2\(3\)sr2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:4.2.3

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.1\(3\)sr3

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.1\(3\)sr2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:4.2.3sr1

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.1\(3\)sr1

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:4.2\(2\)

Trust: 1.0

vendor:ciscomodel:call managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:4.1

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:eqversion:4.3(1)sr1

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:eqversion:4.2(3)sr2

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:4.2

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:ltversion:4.3

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:eqversion:4.1(3)sr5

Trust: 0.8

vendor:ciscomodel:call manager sr2scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:call manager sr1scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.3(1)

Trust: 0.3

vendor:ciscomodel:call manager 4.1 sr4scope: - version: -

Trust: 0.3

sources: BID: 81602 // JVNDB: JVNDB-2007-002570 // CNNVD: CNNVD-200708-518 // NVD: CVE-2007-4634

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4634
value: HIGH

Trust: 1.0

NVD: CVE-2007-4634
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200708-518
value: CRITICAL

Trust: 0.6

VULHUB: VHN-27996
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4634
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27996
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27996 // JVNDB: JVNDB-2007-002570 // CNNVD: CNNVD-200708-518 // NVD: CVE-2007-4634

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-27996 // JVNDB: JVNDB-2007-002570 // NVD: CVE-2007-4634

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-518

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-200708-518

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002570

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27996

PATCH

title:cisco-sa-20070829-ccmurl:http://www.cisco.com/en/US/products/csa/cisco-sa-20070829-ccm.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-002570

EXTERNAL IDS

db:NVDid:CVE-2007-4634

Trust: 2.8

db:BIDid:25480

Trust: 2.0

db:SECTRACKid:1018624

Trust: 2.0

db:SECUNIAid:26641

Trust: 1.8

db:VUPENid:ADV-2007-3010

Trust: 1.7

db:XFid:36326

Trust: 0.9

db:JVNDBid:JVNDB-2007-002570

Trust: 0.8

db:CISCOid:20070829 XSS AND SQL INJECTION IN CISCO CALLMANAGER/UNIFIED COMMUNICATIONS MANAGER LOGON PAGE

Trust: 0.6

db:CNNVDid:CNNVD-200708-518

Trust: 0.6

db:BIDid:81602

Trust: 0.4

db:SEEBUGid:SSVID-83923

Trust: 0.1

db:EXPLOIT-DBid:30541

Trust: 0.1

db:VULHUBid:VHN-27996

Trust: 0.1

db:PACKETSTORMid:58971

Trust: 0.1

sources: VULHUB: VHN-27996 // BID: 81602 // JVNDB: JVNDB-2007-002570 // PACKETSTORM: 58971 // CNNVD: CNNVD-200708-518 // NVD: CVE-2007-4634

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808ae327.shtml

Trust: 2.1

url:http://www.securityfocus.com/bid/25480

Trust: 2.0

url:http://securitytracker.com/id?1018624

Trust: 2.0

url:http://secunia.com/advisories/26641

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3010

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36326

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/36326

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4634

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4634

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3010

Trust: 0.6

url:http://secunia.com/product/2805/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/12534/

Trust: 0.1

url:http://secunia.com/advisories/26641/

Trust: 0.1

url:http://secunia.com/product/5363/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27996 // BID: 81602 // JVNDB: JVNDB-2007-002570 // PACKETSTORM: 58971 // CNNVD: CNNVD-200708-518 // NVD: CVE-2007-4634

CREDITS

The vendor disclosed these issues.

Trust: 0.6

sources: CNNVD: CNNVD-200708-518

SOURCES

db:VULHUBid:VHN-27996
db:BIDid:81602
db:JVNDBid:JVNDB-2007-002570
db:PACKETSTORMid:58971
db:CNNVDid:CNNVD-200708-518
db:NVDid:CVE-2007-4634

LAST UPDATE DATE

2024-11-23T22:09:51.020000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27996date:2017-07-29T00:00:00
db:BIDid:81602date:2007-08-31T00:00:00
db:JVNDBid:JVNDB-2007-002570date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200708-518date:2007-09-05T00:00:00
db:NVDid:CVE-2007-4634date:2024-11-21T00:36:04.443

SOURCES RELEASE DATE

db:VULHUBid:VHN-27996date:2007-08-31T00:00:00
db:BIDid:81602date:2007-08-31T00:00:00
db:JVNDBid:JVNDB-2007-002570date:2012-06-26T00:00:00
db:PACKETSTORMid:58971date:2007-08-31T03:45:27
db:CNNVDid:CNNVD-200708-518date:2007-08-31T00:00:00
db:NVDid:CVE-2007-4634date:2007-08-31T23:17:00