Skip to content

Cisco Unified Call Manager Username Enumeration

ID: cucm-username-enumeration

Severity: medium

Author: manasmbellani

Tags: cisco,cucm,unauth,enum

Cisco Unified Call Manager is vulnerable to username enumeration.

id: cucm-username-enumeration
info:
name: Cisco Unified Call Manager Username Enumeration
author: manasmbellani
severity: medium
description: Cisco Unified Call Manager is vulnerable to username enumeration.
remediation: To mitigate this, enable Contact Search Authentication.
reference:
- https://www.n00py.io/2022/01/unauthenticated-dumping-of-usernames-via-cisco-unified-call-manager-cucm/
metadata:
max-request: 1
tags: cisco,cucm,unauth,enum
http:
- method: GET
path:
- "{{BaseURL}}/cucm-uds/users"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- '<userName>'
- '<lastName>'
- '<phoneNumber>'
condition: and
- type: dsl
dsl:
- contains(tolower(content_type), 'application/xml')
- contains(tolower(content_type), 'text/xml')
condition: or
# digest: 4a0a00473045022100afd7de3c1e44d95aea78accd9453fa649ed9002d79d55a4860fc12f3e5f47398022004df9eae2155bd9404a5b183de8aadafc1900034e3242c0351f0c6ffacf24df8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/cisco/cucm-username-enumeration.yaml"

View on Github