CVE-2008-0026
Published Feb 14, 2008
Last updated 7 years ago
Overview
- Description
- SQL injection vulnerability in Cisco Unified CallManager/Communications Manager (CUCM) 5.0/5.1 before 5.1(3a) and 6.0/6.1 before 6.1(1a) allows remote authenticated users to execute arbitrary SQL commands via the key parameter to the (1) admin and (2) user interface pages.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37FEF567-5F92-40BB-8581-3FCF584AAA1A" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5865997-F8B2-4ABB-96DF-3AE691A7CE5B" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9211420-9F35-4872-879A-5F7CA29C6299" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7DD4B55-4C68-45CD-988E-D470C26E5E71" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(3a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48C1B081-1FD7-4BBD-84BD-E1E5F80C74FE" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC32C417-3E61-4892-9A42-C31C6D62F09D" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.0_4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97694D13-B0A4-4AE4-9142-76F6B7C446C4" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DC17139-DB98-4C59-B29B-1B792C67EB97" }, { "criteria": "cpe:2.3:a:cisco:unified_callmanager:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D748F22-A917-4EE3-B523-13419D826EF5" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2AF68FA-433F-46F2-B309-B60A108BECFA" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFE62DB5-943D-43B5-BD13-D74DAA122578" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2D76BC6-1A59-4D74-A7C9-8C05D96E01F8" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "788BDB54-0970-468F-9713-14B097E1A863" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CAE1371-F46C-4DFD-A4A4-D609E93C4740" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7AC2F39-C029-4FAB-A963-0C7F1D5A8067" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62781360-15FC-4E40-AEF8-BF01606A671B" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a_su1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08E03DCC-4DCB-4830-943F-05F7E3BB49EF" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0_1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05F443F9-B454-42B3-8464-ACEA40066DF5" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E" } ], "operator": "OR" } ] } ]