cve-2024-7477
Vulnerability from cvelistv5
Published
2024-08-08 16:02
Modified
2024-08-09 18:21
Severity ?
EPSS score ?
Summary
A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the Avaya Aura System Manager database.
Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.
References
▼ | URL | Tags | |
---|---|---|---|
securityalerts@avaya.com | https://download.avaya.com/css/public/documents/101091159 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Avaya | Aura System Manager |
Version: 10.1.x.x Version: 10.2.x.x |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aura_system_manager", "vendor": "avaya", "versions": [ { "status": "affected", "version": "10.1.x.x" }, { "status": "affected", "version": "10.2.x.x" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7477", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:20:16.174969Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T18:21:58.052Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Aura System Manager", "vendor": "Avaya", "versions": [ { "status": "affected", "version": "10.1.x.x" }, { "status": "affected", "version": "10.2.x.x" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A SQL injection vulnerability was found which could allow a command line interface (CLI) user with \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eadministrative privileges to execute arbitrary queries against the\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAvaya Aura System Manager\u0026nbsp;\u003c/span\u003edatabase.\u0026nbsp;\n\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.\n\n\u003c/span\u003e\u0026nbsp;" } ], "value": "A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0\n\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T16:02:43.125Z", "orgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "shortName": "avaya" }, "references": [ { "url": "https://download.avaya.com/css/public/documents/101091159" } ], "source": { "defect": [ "ZEPHYR-70310" ], "discovery": "EXTERNAL" }, "title": "Avaya Aura System Manager SQL injection vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9d670455-bdb5-4cca-a883-5914865f5d96", "assignerShortName": "avaya", "cveId": "CVE-2024-7477", "datePublished": "2024-08-08T16:02:43.125Z", "dateReserved": "2024-08-05T07:37:13.538Z", "dateUpdated": "2024-08-09T18:21:58.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.1\", \"versionEndIncluding\": \"10.1.2\", \"matchCriteriaId\": \"263DE525-434E-48C3-A891-8CF42C0AEBC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:avaya:aura_system_manager:10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D5372F1-A670-44CD-B834-A3126F83F9D9\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\\u00a0Avaya Aura System Manager\\u00a0database.\\u00a0\\n\\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 una vulnerabilidad de inyecci\\u00f3n SQL que podr\\u00eda permitir que un usuario de interfaz de l\\u00ednea de comandos (CLI) con privilegios administrativos ejecute consultas arbitrarias en la base de datos de Avaya Aura System Manager. Las versiones afectadas incluyen 10.1.xx y 10.2.xx. Las versiones anteriores a 10.1 finalizan el soporte del fabricante.\"}]", "id": "CVE-2024-7477", "lastModified": "2024-09-11T15:03:06.637", "metrics": "{\"cvssMetricV31\": [{\"source\": \"securityalerts@avaya.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}]}", "published": "2024-08-08T16:15:09.363", "references": "[{\"url\": \"https://download.avaya.com/css/public/documents/101091159\", \"source\": \"securityalerts@avaya.com\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "securityalerts@avaya.com", "vulnStatus": "Analyzed", "weaknesses": "[{\"source\": \"securityalerts@avaya.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2024-7477\",\"sourceIdentifier\":\"securityalerts@avaya.com\",\"published\":\"2024-08-08T16:15:09.363\",\"lastModified\":\"2024-09-11T15:03:06.637\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0\\n\\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL que podr\u00eda permitir que un usuario de interfaz de l\u00ednea de comandos (CLI) con privilegios administrativos ejecute consultas arbitrarias en la base de datos de Avaya Aura System Manager. Las versiones afectadas incluyen 10.1.xx y 10.2.xx. Las versiones anteriores a 10.1 finalizan el soporte del fabricante.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"securityalerts@avaya.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"securityalerts@avaya.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1\",\"versionEndIncluding\":\"10.1.2\",\"matchCriteriaId\":\"263DE525-434E-48C3-A891-8CF42C0AEBC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:aura_system_manager:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5372F1-A670-44CD-B834-A3126F83F9D9\"}]}]}],\"references\":[{\"url\":\"https://download.avaya.com/css/public/documents/101091159\",\"source\":\"securityalerts@avaya.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-7477\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-09T18:20:16.174969Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*\"], \"vendor\": \"avaya\", \"product\": \"aura_system_manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.1.x.x\"}, {\"status\": \"affected\", \"version\": \"10.2.x.x\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-09T18:21:53.406Z\"}}], \"cna\": {\"title\": \"Avaya Aura System Manager SQL injection vulnerability\", \"source\": {\"defect\": [\"ZEPHYR-70310\"], \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-66\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-66 SQL Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Avaya\", \"product\": \"Aura System Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.1.x.x\"}, {\"status\": \"affected\", \"version\": \"10.2.x.x\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://download.avaya.com/css/public/documents/101091159\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\\u00a0Avaya Aura System Manager\\u00a0database.\\u00a0\\n\\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A SQL injection vulnerability was found which could allow a command line interface (CLI) user with \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eadministrative privileges to execute arbitrary queries against the\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAvaya Aura System Manager\u0026nbsp;\u003c/span\u003edatabase.\u0026nbsp;\\n\\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support.\\n\\n\u003c/span\u003e\u0026nbsp;\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-89\", \"description\": \"CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"9d670455-bdb5-4cca-a883-5914865f5d96\", \"shortName\": \"avaya\", \"dateUpdated\": \"2024-08-08T16:02:43.125Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-7477\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-09T18:21:58.052Z\", \"dateReserved\": \"2024-08-05T07:37:13.538Z\", \"assignerOrgId\": \"9d670455-bdb5-4cca-a883-5914865f5d96\", \"datePublished\": \"2024-08-08T16:02:43.125Z\", \"assignerShortName\": \"avaya\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.