VAR-201205-0224
Vulnerability from variot - Updated: 2025-04-11 23:12SQL injection vulnerability in the web component in Cisco Unified MeetingPlace 7.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCtx08939. Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Cisco Unified MeetingPlace versions prior to 7.1.2.6 (MR1) are affected. This solution provides a user environment that integrates voice, video and Web conferencing
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201205-0224",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "7.1"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "web conferencing 8.0mr1 patch 1"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "web conferencing 8.5mr3"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "web conferencing 7.0"
},
{
"model": "unified meetingplace",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "7.1"
},
{
"model": "unified meetingplace",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "8.0"
},
{
"model": "unified meetingplace",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "8.5"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "web conferencing 7.1mr1"
},
{
"model": "unified meetingplace web conferencing",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.0"
},
{
"model": "unified meetingplace web conferencing",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.639.3"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.639.2"
},
{
"model": "unified meetingplace hotfix 5f",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.0(2.3)"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7"
},
{
"model": "unified meetingplace",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6"
},
{
"model": "unified meetingplace",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "7.1.26"
}
],
"sources": [
{
"db": "BID",
"id": "53431"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:cisco:unified_meetingplace",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported these issues.",
"sources": [
{
"db": "BID",
"id": "53431"
}
],
"trust": 0.3
},
"cve": "CVE-2012-0337",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-0337",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-53618",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2012-0337",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2012-0337",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201205-049",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-53618",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53618"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection vulnerability in the web component in Cisco Unified MeetingPlace 7.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCtx08939. \nExploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. \nCisco Unified MeetingPlace versions prior to 7.1.2.6 (MR1) are affected. This solution provides a user environment that integrates voice, video and Web conferencing",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0337"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "BID",
"id": "53431"
},
{
"db": "VULHUB",
"id": "VHN-53618"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-0337",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "19587",
"trust": 0.6
},
{
"db": "BID",
"id": "53431",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-53618",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53618"
},
{
"db": "BID",
"id": "53431"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"id": "VAR-201205-0224",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-53618"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-11T23:12:57.696000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20121031-mp",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121031-mp"
},
{
"title": "Release Notes for Cisco Unified MeetingPlace Release 8.5",
"trust": 0.8,
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/8_5/english/releasenotes/mp85rn.html"
},
{
"title": "Release Notes for Cisco Unified MeetingPlace Release 7.1",
"trust": 0.8,
"url": "http://www.cisco.com/en/US/docs/voice_ip_comm/meetingplace/7_1/english/release_notes/mp71rn.html"
},
{
"title": "cisco-sa-20121031-mp",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/JP/111/1116/1116755_cisco-sa-20121031-mp-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53618"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.cisco.com/en/us/docs/voice_ip_comm/meetingplace/7_1/english/release_notes/mp71rn.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0337"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0337"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/19587"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/ps5664/ps5669/index.html"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53618"
},
{
"db": "BID",
"id": "53431"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-53618"
},
{
"db": "BID",
"id": "53431"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-05-02T00:00:00",
"db": "VULHUB",
"id": "VHN-53618"
},
{
"date": "2012-04-18T00:00:00",
"db": "BID",
"id": "53431"
},
{
"date": "2012-05-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"date": "2012-05-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"date": "2012-05-02T10:09:21.927000",
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-53618"
},
{
"date": "2012-11-01T16:30:00",
"db": "BID",
"id": "53431"
},
{
"date": "2012-12-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-002203"
},
{
"date": "2012-05-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201205-049"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2012-0337"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Unified MeetingPlace of Web In the component SQL Injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2012-002203"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201205-049"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…