{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T07:50:38.076","vulnerabilities":[{"cve":{"id":"CVE-2017-15329","sourceIdentifier":"psirt@huawei.com","published":"2018-02-15T16:29:00.203","lastModified":"2024-11-21T03:14:28.520","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Huawei UMA V200R001C00 has a SQL injection vulnerability in the operation and maintenance module. An attacker logs in to the system as a common user and sends crafted HTTP requests that contain malicious SQL statements to the affected system. Due to a lack of input validation on HTTP requests that contain user-supplied input, successful exploitation may allow the attacker to execute arbitrary SQL queries."},{"lang":"es","value":"Huawei UMA V200R001C00 tiene una vulnerabilidad de inyección SQL en el módulo de operación y mantenimiento. Un atacante inicia sesión en el sistema como usuario común y envía peticiones HTTP manipuladas que contienen instrucciones SQL al sistema afectado. Debido a la falta de validación de entradas de peticiones HTTP que contienen entradas proporcionadas por el usuario, la explotación con éxito podría permitir que el atacante ejecute consultas SQL arbitrarias."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*","matchCriteriaId":"207D80F3-6DB4-4BDE-AE72-38BAF4EE2B67"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:uma:-:*:*:*:*:*:*:*","matchCriteriaId":"E1940680-0927-4E56-83E3-3525797978B3"}]}]}],"references":[{"url":"http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171116-01-uma-en","source":"psirt@huawei.com","tags":["Vendor Advisory"]},{"url":"http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171116-01-uma-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}