2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-4634" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-08-31T23:17:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:36:04.443" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands via the lang variable to the (1) user or (2) admin logon page, aka CSCsi64265."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Cisco CallManager y Unified Communications Manager (CUCM) versiones anteriores a 3.3(5)sr2b, 4.1 versiones anteriores a 4.1(3)sr5, 4.2 versiones anteriores a 4.2(3)sr2, y 4.3 versiones anteriores a 4.3(1)sr1, permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante la variable lang en la p\u00e1gina de acceso de (1) usuario \u00f3 (2) administrador, tambi\u00e9n conocido como CSCsi64265."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65BB9155-89E5-4D54-AF1B-D5CA38392D5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFFD96E3-B19F-41B7-86FD-DBFD41382C28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E9BF838-87A2-43B8-975B-524D7F954BF5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9600EA23-5428-4312-A38E-480E3C3228BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57F5547E-F9C8-4F9C-96A1-563A66EE8D48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6C20851-DC17-4E89-A6C1-D1B52D47608F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC830649-C0D4-4FFC-8701-80FB4A706F58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "935D2815-7146-4125-BDBE-BFAA62A88EC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "577571D6-AC59-4A43-B9A5-7B6FC6D2046C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8F1DEC3B-2782-4144-9651-73116294765D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6049596-9D62-4EC4-BEAE-A2023F6F3346"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87560280-EF6A-46DC-9368-0C98E0A5B7E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F977BD4D-308D-4415-9302-5C44238881A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "373E71AE-C735-4476-A574-56C35BAD8DB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F9AA9D0-3205-4A5D-8161-C80D1855D91E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B771F3F8-CD24-4710-A7A8-D4F9E0DB4BB2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71DA8A99-A678-42F8-AFC5-323E77D9BCC5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3C30434-29FD-45D4-B9D8-BEB65FE4471A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FA55FCB-FFFB-495F-86A8-262E7995B519"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6ECFC2B-9978-46FF-BC4E-A81B9B835E29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2\\(2\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3979687E-2BDE-42CD-ACF6-5EE3AF6CD5B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2\\(3\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB63E43F-96D1-442E-8AA7-B0183117F6A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86960ABE-F133-49EE-A8E3-70CF1DD93ADC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.2\\(3\\)sr2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36C8C9AA-8AA2-40C2-88A2-0860543601C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98B77A94-5477-4703-9421-2266EC603319"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:call_manager:4.3\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AF86C50-A2B2-4944-8361-C67766DCA2DA"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/26641" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securitytracker.com/id?1018624" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a00808ae327.shtml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/25480" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/3010" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36326" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://secunia.com/advisories/26641" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://securitytracker.com/id?1018624" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a00808ae327.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/25480" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/3010" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36326" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}