Advisory Details

May 10th, 2013

Cisco Clean Access Manager filter SQL Injection Remote Code Execution Vulnerability

ZDI-13-067
ZDI-CAN-1535

CVE ID CVE-2013-1177
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Cisco
AFFECTED PRODUCTS Clean Access Manager
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Clean Access Manager. Authentication is not required to exploit this vulnerability.

The specific flaw is in the handling of filter URL parameters when constructing SQL database queries. By specially crafting URL parameters, it is possible to influence the SQL queries to gain remote code execution on the affected system.

ADDITIONAL DETAILS Cisco has issued an update to correct this vulnerability. More details can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130417-nac
DISCLOSURE TIMELINE
  • 2012-07-24 - Vulnerability reported to vendor
  • 2013-05-10 - Coordinated public release of advisory
CREDIT Nenad Stojanovski
BACK TO ADVISORIES