var-201407-0365
Vulnerability from variot
The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 10 does not properly implement access control, which allows remote attackers to modify user information via a crafted URL, aka Bug ID CSCum77041. Vendors have confirmed this vulnerability Bug ID CSCum77041 It is released as.Skillfully crafted by a third party URL Via, user information may be changed. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCum77041. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0365", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unified communications domain manager", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "unified cdm application software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.1" }, { "model": "unified cdm application software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "8.1.4" }, { "model": "unified communications domain manager", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "unified cdm application software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "10" }, { "model": "unified cdm application software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.1.4" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "CNNVD", "id": "CNNVD-201407-179" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:unified_communications_domain_manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cisco:unified_cdm_application_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003227" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fatih Ozavci from Sense of Security", "sources": [ { "db": "BID", "id": "68331" } ], "trust": 0.3 }, "cve": "CVE-2014-3300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-3300", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-71240", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-3300", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-3300", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201407-179", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-71240", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71240" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "CNNVD", "id": "CNNVD-201407-179" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 10 does not properly implement access control, which allows remote attackers to modify user information via a crafted URL, aka Bug ID CSCum77041. Vendors have confirmed this vulnerability Bug ID CSCum77041 It is released as.Skillfully crafted by a third party URL Via, user information may be changed. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nThis issue is being tracked by Cisco Bug ID CSCum77041. This component features scalable, distributed, and highly available enterprise Voice over IP call processing", "sources": [ { "db": "NVD", "id": "CVE-2014-3300" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "BID", "id": "68331" }, { "db": "VULHUB", "id": "VHN-71240" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3300", "trust": 2.8 }, { "db": "BID", "id": "68331", "trust": 1.4 }, { "db": "SECUNIA", "id": "59556", "trust": 1.1 }, { "db": "SECTRACK", "id": "1030515", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-003227", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201407-179", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-71240", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71240" }, { "db": "BID", "id": "68331" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "CNNVD", "id": "CNNVD-201407-179" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "id": "VAR-201407-0365", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71240" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:45:00.683000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "34689", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=34689" }, { "title": "cisco-sa-20140702-cucdm", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140702-cucdm" }, { "title": "34792", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34792" }, { "title": "cisco-sa-20140702-cucdm", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/112/1122/1122753_cisco-sa-20140702-cucdm-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71240" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140702-cucdm" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/68331" }, { "trust": 1.1, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=34689" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1030515" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59556" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3300" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3300" }, { "trust": 0.3, "url": "www.cisco.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71240" }, { "db": "BID", "id": "68331" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "CNNVD", "id": "CNNVD-201407-179" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71240" }, { "db": "BID", "id": "68331" }, { "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "db": "CNNVD", "id": "CNNVD-201407-179" }, { "db": "NVD", "id": "CVE-2014-3300" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-07T00:00:00", "db": "VULHUB", "id": "VHN-71240" }, { "date": "2014-07-02T00:00:00", "db": "BID", "id": "68331" }, { "date": "2014-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "date": "2014-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-179" }, { "date": "2014-07-07T11:01:30.180000", "db": "NVD", "id": "CVE-2014-3300" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-01-12T00:00:00", "db": "VULHUB", "id": "VHN-71240" }, { "date": "2014-07-02T00:00:00", "db": "BID", "id": "68331" }, { "date": "2014-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003227" }, { "date": "2014-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-179" }, { "date": "2024-11-21T02:07:49.250000", "db": "NVD", "id": "CVE-2014-3300" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Unified CDM Application Software of Cisco Unified Communications Domain Manager Vulnerability in changing user information", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-179" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…