Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15972 PoC — Cisco Unified Communications Manager SQL Injection Vulnerability

Source
Associated Vulnerability
Title:Cisco Unified Communications Manager SQL Injection Vulnerability (CVE-2019-15972)
Description:A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database.
Description
Scripts that can be used to exploit CVE-2019-15972 which was an Authenticated SQLi issue in Cisco Unified Call Manager (UCM).
Readme
# CVE-2019-15972 Cisco UCM SQLi Scripts
Scripts that can be used to exploit CVE-2019-15972 which was an Authenticated SQLi issue in Cisco Unified Call Manager (UCM).

* Enumerate tables - enumerate all tables on the underlying database and place the table names in a text file
* Extract tables - take the list of tables and extract the contents of each table
* Related F-Secure advisory can be found here: https://labs.f-secure.com/advisories/cisco-ucm-informix-sql-injection/
* Details on how this vulnerability was discovered and exploited can be found here: https://labs.f-secure.com/blog/uncommon-sql-database-alert-informix-sql-injection/
File Snapshot

[4.0K] /data/pocs/c7f9d73f8dd9cfe6503e87b66758cc4174d8bf1a ├── [ 644] README.md ├── [ 17K] sql_injection_enumerate_tables.py └── [ 33K] sql_injection_extract_table.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →