VSR has provided details for exploitation of a SQL injection vulnerability in the Cisco Unified CM.
431609db2a8f65e9c7c940eb4f778ca8b8667fd1087f8395211a97ef55ea6ce0
Zero Day Initiative Advisory 11-143 - This vulnerability allows remote attackers to inject arbitrary SQL into the backend database on vulnerable installations of Cisco Unified CM. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Call Manager component. The system exposes an Apache webserver which contains a JSP script vulnerable to SQL injection. The xmldirectorylist.jsp file does not properly validate the f, l, and n parameters before passing them to the database. A remote attacker can abuse this to inject SQL statements to be evaluated by the underlying database.
fa308914464bf01926e9a4d4ac3410d95c29f7cd0ee2f39af6da943a997c5e67
Cisco Security Advisory - The Cisco Unified Communications Manager (previously known as Cisco CallManager) contains three denial of service, one directory traversal, and two remote SQL injection vulnerabilities. Cisco has released free software updates for affected Cisco Unified Communications Manager versions to address the vulnerabilities. A workaround exists only for the SIP DoS vulnerabilities.
5ae74f0b10827f96802e2977dc8fccc4979630a072e817f89575dcdb335060fa