| |
Podatność CVE-2020-3464
Publikacja: 2020-08-17
Opis: |
A vulnerability in the web-based management interface of Cisco UCS Director could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need administrative credentials on the affected device. |
Typ:
CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
CVSS2 => (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Ogólna skala CVSS |
Znaczenie |
Łatwość wykorzystania |
3.5/10 |
2.9/10 |
6.8/10 |
Wymagany dostęp |
Złożoność ataku |
Autoryzacja |
Zdalny |
Średnia |
Jednorazowa |
Wpływ na poufność |
Wpływ na integralność |
Wpływ na dostępność |
Brak |
Częściowy |
Brak |
Referencje: |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-director-xss-O7T8ORYR
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|