CVE-2006-3109

Cross-site scripting (XSS) vulnerability in Cisco CallManager 3.3 before 3.3(5)SR3, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3), and 4.3 before 4.3(1), allows remote attackers to inject arbitrary web script or HTML via the (1) pattern parameter in ccmadmin/phonelist.asp and (2) arbitrary parameters in ccmuser/logon.asp, aka bugid CSCsb68657.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047015.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047019.html
http://secunia.com/advisories/20735
http://securityreason.com/securityalert/1114
http://securitytracker.com/id?1016328 Exploit Patch
http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_security_response09186a00806c0846.html Patch
http://www.fishnetsecurity.com/csirt/disclosure/cisco/Cisco+CallManager+XSS+Advisory.htm Exploit
http://www.osvdb.org/26651
http://www.osvdb.org/26652
http://www.securityfocus.com/archive/1/437757/100/0/threaded
http://www.securityfocus.com/bid/18504 Exploit
http://www.vupen.com/english/advisories/2006/2443
https://exchange.xforce.ibmcloud.com/vulnerabilities/27225
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047015.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047019.html
http://secunia.com/advisories/20735
http://securityreason.com/securityalert/1114
http://securitytracker.com/id?1016328 Exploit Patch
http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_security_response09186a00806c0846.html Patch
http://www.fishnetsecurity.com/csirt/disclosure/cisco/Cisco+CallManager+XSS+Advisory.htm Exploit
http://www.osvdb.org/26651
http://www.osvdb.org/26652
http://www.securityfocus.com/archive/1/437757/100/0/threaded
http://www.securityfocus.com/bid/18504 Exploit
http://www.vupen.com/english/advisories/2006/2443
https://exchange.xforce.ibmcloud.com/vulnerabilities/27225
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:cisco:call_manager:3.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(3\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(3\)es61:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(4\)es25:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(5\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(5\)es30:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(5\)sr1:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:3.3\(5\)sr2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(2\)es33:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(2\)es55:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(3\)es07:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(3\)es32:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr1:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.2:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.2\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.2\(2\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:call_manager:4.3\(1\):*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047015.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047015.html -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047019.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047019.html -
References () http://secunia.com/advisories/20735 - () http://secunia.com/advisories/20735 -
References () http://securityreason.com/securityalert/1114 - () http://securityreason.com/securityalert/1114 -
References () http://securitytracker.com/id?1016328 - Exploit, Patch () http://securitytracker.com/id?1016328 - Exploit, Patch
References () http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_security_response09186a00806c0846.html - Patch () http://www.cisco.com/en/US/products/sw/voicesw/ps556/tsd_products_security_response09186a00806c0846.html - Patch
References () http://www.fishnetsecurity.com/csirt/disclosure/cisco/Cisco+CallManager+XSS+Advisory.htm - Exploit () http://www.fishnetsecurity.com/csirt/disclosure/cisco/Cisco+CallManager+XSS+Advisory.htm - Exploit
References () http://www.osvdb.org/26651 - () http://www.osvdb.org/26651 -
References () http://www.osvdb.org/26652 - () http://www.osvdb.org/26652 -
References () http://www.securityfocus.com/archive/1/437757/100/0/threaded - () http://www.securityfocus.com/archive/1/437757/100/0/threaded -
References () http://www.securityfocus.com/bid/18504 - Exploit () http://www.securityfocus.com/bid/18504 - Exploit
References () http://www.vupen.com/english/advisories/2006/2443 - () http://www.vupen.com/english/advisories/2006/2443 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27225 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27225 -

Information

Published : 2006-06-21 01:02

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3109

Mitre link : CVE-2006-3109

CVE.ORG link : CVE-2006-3109


JSON object : View

Products Affected

cisco

  • call_manager