A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct an SQL injection attack due to insufficient input validation for the signin interface. A successful exploit could allow an attacker to extract sensitive information from the database.
References
Link | Resource |
---|---|
https://www.mitel.com/mitel-product-security-advisory-18-0003 | Broken Link Vendor Advisory |
https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf | Broken Link Vendor Advisory |
https://www.mitel.com/mitel-product-security-advisory-18-0003 | Broken Link Vendor Advisory |
https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mitel.com/mitel-product-security-advisory-18-0003 - Broken Link, Vendor Advisory | |
References | () https://www.mitel.com/sites/default/files/2018-Security-Bulletin-18-0003-001.pdf - Broken Link, Vendor Advisory |
Information
Published : 2018-04-25 20:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-9102
Mitre link : CVE-2018-9102
CVE.ORG link : CVE-2018-9102
JSON object : View
Products Affected
mitel
- mivoice_connect
- st_14.2
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')