CVE-2006-3109 (CNNVD-200606-379)
MEDIUM
有利用代码
中文标题:
Cisco CallManager 多个跨站脚本攻击漏洞
英文标题:
Cross-site scripting (XSS) vulnerability in Cisco CallManager 3.3 before 3.3(5)SR3, 4.1 before 4.1(3...
CVSS分数:
4.3
发布时间:
2006-06-21 01:00:00
漏洞类型:
跨站脚本
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v5
漏洞描述
中文描述:
Cisco CallManager 3.3 3.3(5)SR3之前的3.3 版本, 4.1(3)SR4之前的4.1 版本, 4.2(3)之前的4.2版本,以及4.3(1)之前的4.3版本存在跨站脚本攻击(XSS)漏洞。远程攻击者可以借助(1)ccmadmin/phonelist.asp中的pattern参数和(2)ccmuser/logon.asp中的任意参数,注入任意Web脚本或HTML,又称CSCsb68657。
英文描述:
Cross-site scripting (XSS) vulnerability in Cisco CallManager 3.3 before 3.3(5)SR3, 4.1 before 4.1(3)SR4, 4.2 before 4.2(3), and 4.3 before 4.3(1), allows remote attackers to inject arbitrary web script or HTML via the (1) pattern parameter in ccmadmin/phonelist.asp and (2) arbitrary parameters in ccmuser/logon.asp, aka bugid CSCsb68657.
CWE类型:
(暂无数据)
标签:
webapps
asp
Jake Reynolds
OSVDB-26651
OSVDB-26652
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | call_manager | 3.3 | - | - |
cpe:2.3:h:cisco:call_manager:3.3:*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(3\) | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(3\):*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(3\)es61 | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(3\)es61:*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(4\)es25 | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(4\)es25:*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(5\) | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(5\):*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(5\)es30 | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(5\)es30:*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(5\)sr1 | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(5\)sr1:*:*:*:*:*:*:*
|
| cisco | call_manager | 3.3\(5\)sr2 | - | - |
cpe:2.3:h:cisco:call_manager:3.3\(5\)sr2:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1 | - | - |
cpe:2.3:h:cisco:call_manager:4.1:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(2\)es33 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(2\)es33:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(2\)es55 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(2\)es55:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(3\)es07 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(3\)es07:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(3\)es32 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(3\)es32:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(3\)sr1 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr1:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(3\)sr2 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr2:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.1\(3\)sr3 | - | - |
cpe:2.3:h:cisco:call_manager:4.1\(3\)sr3:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.2 | - | - |
cpe:2.3:h:cisco:call_manager:4.2:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.2\(1\) | - | - |
cpe:2.3:h:cisco:call_manager:4.2\(1\):*:*:*:*:*:*:*
|
| cisco | call_manager | 4.2\(2\) | - | - |
cpe:2.3:h:cisco:call_manager:4.2\(2\):*:*:*:*:*:*:*
|
| cisco | call_manager | 4.3 | - | - |
cpe:2.3:h:cisco:call_manager:4.3:*:*:*:*:*:*:*
|
| cisco | call_manager | 4.3\(1\) | - | - |
cpe:2.3:h:cisco:call_manager:4.3\(1\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1114
third-party-advisory
cve.org
访问
cve.org
26651
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
20060619 Cisco Response to: Input Validation/Output Encoding Vulnerabilities in Cisco CallManager Allow Script Injection Attacks
vendor-advisory
cve.org
访问
cve.org
18504
vdb-entry
cve.org
访问
cve.org
20060619 Input Validation/Output Encoding Vulnerabilities in Cisco CallManager Allow Script Injection Attacks
mailing-list
cve.org
访问
cve.org
cisco-callmanager-web-xss(27225)
vdb-entry
cve.org
访问
cve.org
1016328
vdb-entry
cve.org
访问
cve.org
20060620 Re: Input Validation/Output Encoding Vulnerabilities in Cisco CallManager Allow Script Injection Attacks
mailing-list
cve.org
访问
cve.org
20735
third-party-advisory
cve.org
访问
cve.org
ADV-2006-2443
vdb-entry
cve.org
访问
cve.org
20060619 Input Validation/Output Encoding Vulnerabilities in Cisco CallManager Allow Script Injection Attacks
mailing-list
cve.org
访问
cve.org
26652
vdb-entry
cve.org
访问
cve.org
ExploitDB EDB-28061
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-28061
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2006-3109
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-28062
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-28062
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
4.3
MEDIUM
CVSS向量:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本:
2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2006-06-21 01:00:00
修改时间:
2024-08-07 18:16:05
创建时间:
2025-11-11 15:32:35
更新时间:
2025-11-11 16:23:55
利用信息
此漏洞有可利用代码!
利用代码数量:
2
利用来源:
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-3109 |
2025-11-11 15:17:43 | 2025-11-11 07:32:35 |
| NVD | nvd_CVE-2006-3109 |
2025-11-11 14:51:49 | 2025-11-11 07:41:20 |
| CNNVD | cnnvd_CNNVD-200606-379 |
2025-11-11 15:08:51 | 2025-11-11 07:49:08 |
| EXPLOITDB | exploitdb_EDB-28061 |
2025-11-11 15:05:20 | 2025-11-11 08:23:55 |
| EXPLOITDB | exploitdb_EDB-28062 |
2025-11-11 15:05:20 | 2025-11-11 08:23:55 |
版本与语言
当前版本:
v5
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5
EXPLOITDB
2025-11-11 16:23:55
references_count: 16 → 18; tags_count: 4 → 5
查看详细变更
- references_count: 16 -> 18
- tags_count: 4 -> 5
v4
EXPLOITDB
2025-11-11 16:23:55
references_count: 13 → 16; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 13 -> 16
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:49:08
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-200606-379; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-200606-379
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:20
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 21; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 21
- data_sources: ['cve'] -> ['cve', 'nvd']