—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities
Advisory ID: cisco-sa-20190515-pi-sqlinject
Revision: 1.0
For Public Release: 2019 May 15 16:00 GMT
Last Updated: 2019 May 15 16:00 GMT
CVE ID(s): CVE-2019-1824, CVE-2019-1825
CVSS Score v(3): 8.1 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
+———————————————————————
Summary
=======
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries.
These vulnerabilities exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit these vulnerabilities by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject”]
—–BEGIN PGP SIGNATURE—–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=mwDd
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com