Cisco Unified Email Interaction Manager and Cisco Unified Web Interaction Manager SQL Injection Vulnerability

Cisco-SA-20150527-CVE-2015-0753 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the Cisco Unified Email Interaction Manager (EIM) and Cisco Unified Web Interaction Manager (WIM) interface could allow an unauthenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries. The vulnerability is due to a lack of input validation on user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected system. An exploit could allow the attacker to determine the presence of certain values in the database. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, the attacker must be able to submit malicious requests to the targeted system, making exploitation more difficult in environments that restrict network access from untrusted sources. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

For additional information about SQL injection attacks and defenses, see Understanding SQL Injectionhttp://www.cisco.com/web/about/security/intelligence/sql_injection.html .

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0753
Cisco Bug IDsCSCuu30028
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

Products with public affected evidence