ID

VAR-200810-0356


CVE

CVE-2008-4542


TITLE

Cisco Unity Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2008-002360

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Cisco Unity 4.x before 4.2(1)ES162, 5.x before 5.0(1)ES56, and 7.x before 7.0(2)ES8 allows remote authenticated administrators to inject arbitrary web script or HTML by entering it in the database (aka data store). Unity is prone to a cross-site scripting vulnerability. Cisco Unity is a voice and unified messaging platform. Multiple security vulnerabilities exist in Cisco Unity that could allow a malicious user to disclose sensitive information, cause a denial of service, or inject malicious scripts. A remote attacker could provide malicious data to the database. The next time an administrator logs in and visits a page that relies on the stored information, cross-site scripting can be executed. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Cisco Unity Script Insertion Vulnerability SECUNIA ADVISORY ID: SA32207 VERIFY ADVISORY: http://secunia.com/advisories/32207/ CRITICAL: Not critical IMPACT: Cross Site Scripting WHERE: >From local network SOFTWARE: Cisco Unity 4.x http://secunia.com/advisories/product/4386/ Cisco Unity 5.x http://secunia.com/advisories/product/20082/ Cisco Unity 7.x http://secunia.com/advisories/product/20083/ DESCRIPTION: A vulnerability has been reported in Cisco Unity, which can be exploited by malicious users to conduct script insertion attacks. Unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed. Successful exploitation requires valid administrator access. SOLUTION: The vulnerability will be fixed in versions 4.2(1)ES162 5.0(1)ES56, and 7.0(2)ES8. PROVIDED AND/OR DISCOVERED BY: VoIPshield Systems ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20081008-unity.shtml VoIPshield: http://www.voipshield.com/research-details.php?id=127&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=DESC ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-4542 // JVNDB: JVNDB-2008-002360 // BID: 80844 // VULHUB: VHN-34667 // PACKETSTORM: 70764

AFFECTED PRODUCTS

vendor:ciscomodel:unityscope:eqversion:7.0

Trust: 1.9

vendor:ciscomodel:unityscope:eqversion:5.0

Trust: 1.9

vendor:ciscomodel:unityscope:eqversion:4.0

Trust: 1.9

vendor:ciscomodel:unityscope:eqversion:4.0\(3\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(4\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(5\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(2\)

Trust: 1.6

vendor:ciscomodel:unityscope:eqversion:4.0\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:7.0\(2\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:5.0\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:lteversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:eqversion:4.1\(1\)

Trust: 1.0

vendor:ciscomodel:unityscope:ltversion:4.2(1)es162

Trust: 0.8

vendor:ciscomodel:unityscope:ltversion:5.0(1)es56

Trust: 0.8

vendor:ciscomodel:unityscope:ltversion:7.0(2)es8

Trust: 0.8

vendor:ciscomodel:unityscope:eqversion:5.0\(1\)

Trust: 0.6

vendor:ciscomodel:unityscope:eqversion:4.2\(1\)

Trust: 0.6

vendor:ciscomodel:unity 7.0%282%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 5.0%281%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.2%281%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.1%281%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%285%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%284%29 sr1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%284%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%283%29 sr2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%283%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%282%29scope: - version: -

Trust: 0.3

vendor:ciscomodel:unity 4.0%281%29scope: - version: -

Trust: 0.3

sources: BID: 80844 // JVNDB: JVNDB-2008-002360 // CNNVD: CNNVD-200810-182 // NVD: CVE-2008-4542

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4542
value: LOW

Trust: 1.0

NVD: CVE-2008-4542
value: LOW

Trust: 0.8

CNNVD: CNNVD-200810-182
value: LOW

Trust: 0.6

VULHUB: VHN-34667
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2008-4542
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-34667
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-34667 // JVNDB: JVNDB-2008-002360 // CNNVD: CNNVD-200810-182 // NVD: CVE-2008-4542

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-34667 // JVNDB: JVNDB-2008-002360 // NVD: CVE-2008-4542

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200810-182

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200810-182

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002360

PATCH

title:107983url:http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-002360

EXTERNAL IDS

db:NVDid:CVE-2008-4542

Trust: 2.8

db:BIDid:31642

Trust: 2.0

db:SECTRACKid:1021012

Trust: 2.0

db:SECUNIAid:32207

Trust: 1.8

db:VUPENid:ADV-2008-2771

Trust: 1.7

db:XFid:45744

Trust: 0.9

db:JVNDBid:JVNDB-2008-002360

Trust: 0.8

db:CISCOid:20081008 VOIPSHIELD REPORTED VULNERABILITIES IN CISCO UNITY SERVER

Trust: 0.6

db:CNNVDid:CNNVD-200810-182

Trust: 0.6

db:BIDid:80844

Trust: 0.4

db:VULHUBid:VHN-34667

Trust: 0.1

db:PACKETSTORMid:70764

Trust: 0.1

sources: VULHUB: VHN-34667 // BID: 80844 // JVNDB: JVNDB-2008-002360 // PACKETSTORM: 70764 // CNNVD: CNNVD-200810-182 // NVD: CVE-2008-4542

REFERENCES

url:http://www.securityfocus.com/bid/31642

Trust: 2.0

url:http://www.cisco.com/en/us/products/products_security_response09186a0080a0d861.html

Trust: 2.0

url:http://www.voipshield.com/research-details.php?id=127

Trust: 2.0

url:http://securitytracker.com/id?1021012

Trust: 2.0

url:http://secunia.com/advisories/32207

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2771

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45744

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/45744

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4542

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4542

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2771

Trust: 0.6

url:http://secunia.com/advisories/product/20082/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/4386/

Trust: 0.1

url:http://secunia.com/advisories/product/20083/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sr-20081008-unity.shtml

Trust: 0.1

url:http://www.voipshield.com/research-details.php?id=127&s=1&threats_details=&threats_category=0&threats_vendor=0&limit=20&sort=discovered&sortby=desc

Trust: 0.1

url:http://secunia.com/advisories/32207/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-34667 // BID: 80844 // JVNDB: JVNDB-2008-002360 // PACKETSTORM: 70764 // CNNVD: CNNVD-200810-182 // NVD: CVE-2008-4542

CREDITS

VoIPshield

Trust: 0.6

sources: CNNVD: CNNVD-200810-182

SOURCES

db:VULHUBid:VHN-34667
db:BIDid:80844
db:JVNDBid:JVNDB-2008-002360
db:PACKETSTORMid:70764
db:CNNVDid:CNNVD-200810-182
db:NVDid:CVE-2008-4542

LAST UPDATE DATE

2024-11-23T22:09:33.051000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-34667date:2017-08-08T00:00:00
db:BIDid:80844date:2008-10-13T00:00:00
db:JVNDBid:JVNDB-2008-002360date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200810-182date:2008-12-24T00:00:00
db:NVDid:CVE-2008-4542date:2024-11-21T00:51:56.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-34667date:2008-10-13T00:00:00
db:BIDid:80844date:2008-10-13T00:00:00
db:JVNDBid:JVNDB-2008-002360date:2009-07-08T00:00:00
db:PACKETSTORMid:70764date:2008-10-10T16:17:34
db:CNNVDid:CNNVD-200810-182date:2008-10-13T00:00:00
db:NVDid:CVE-2008-4542date:2008-10-13T20:00:02.340