Cisco Security Agent SQL Injection and Directory Traversal Vulnerabilities


Description   Multiple vulnerabilities were identified in Cisco Security Agent, which could be exploited to conduct directory traversal, SQL injection, or denial of service attacks.
This first issue is caused by input validation errors in the Management Center when processing user-supplied data, which may be exploited by authenticated users to execute SQL statements.
The second vulnerability is caused by input validation errors in the Management Center when processing user-supplied data, which may be exploited by authenticated users to view and download arbitrary files from the server.
The third issue is caused by an unspecified error when processing a series of TCP packets, which could be exploited by attackers to cause a denial of service.
     
Vulnerable Products   Vulnerable Software:
Cisco Security Agent version 5.1Cisco Security Agent version 5.2Cisco Security Agent version 6.0Cisco Unified Communications Manager (CallManager)Cisco Conference Connection (CCC)Cisco IPCC ExpressCisco IPCC EnterpriseCisco IPCC HostedCisco IP Interactive Voice Response (IP IVR)Cisco IP Queue ManagerCisco Intelligent Contact Management (ICM)Cisco Voice Portal (CVP)Cisco Unified Meeting PlaceCisco Personal Assistant (PA)Cisco UnityCisco Unity ConnectionCisco Unity BridgeCisco Internet Service Node (ISN)Cisco Security Manager (CSM)
     
Solution   Apply fixes : http://www.cisco.com/warp/public/707/cisco-sa-20100217-csa.shtml
     
CVE   CVE-2010-0148
CVE-2010-0147
CVE-2010-0146
     
References   http://www.cisco.com/warp/public/707/cisco-sa-20100217-csa.shtml
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
SQL injection Prevention - POST : suspicious SELECT statement in data
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - POST : possible version probing in data
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
3.2.0
SQL injection Prevention - POST : suspicious CREATE statement in data
3.2.0
Directory traversal using ..\..
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
3.2.0
SQL injection Prevention - POST : suspicious UNION statement in data
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
Directory traversal
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - POST : suspicious DROP statement in data
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
SQL injection Prevention - POST : suspicious INSERT statement in data
3.2.0
SQL injection Prevention - POST : suspicious OR statement in data
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
SQL injection Prevention - POST : suspicious EXEC statement in data
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
Misc : Remote code execution prevention: 2 '|' characters found as a parameter of a script file
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
Directory traversal backward root folder
3.2.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
3.2.0
SQL injection Prevention - POST : suspicious HAVING statement in data
3.2.0
SQL injection Prevention - POST : suspicious CAST statement in data
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2010-02-18 

 Target Type 
Client + Server 

 Possible exploit 
Local & Remote