The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the attacker to determine the presence of values in the SQL database of the affected software.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2wlSHHn
The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the attacker to determine the presence of values in the SQL database of the affected software.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2wlSHHn
Security Impact Rating: Medium
CVE: CVE-2017-6754
from Cisco Security Advisory http://ift.tt/2wlSHHn
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.