Vulnerability CVE-2014-3289


Published: 2014-06-10

Description:
Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Centreon SQL Injection / Command Injection
MaZ
19.10.2014

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Cisco -> Content security management appliance 
Cisco -> Email security appliance 
Cisco -> Web security appliance 
Cisco -> Ironport asyncos 
Cisco -> Email security appliance firmware 

 References:
http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html
http://seclists.org/fulldisclosure/2014/Jun/57
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289
http://tools.cisco.com/security/center/viewAlert.x?alertId=34569
http://www.kb.cert.org/vuls/id/613308
http://www.securityfocus.com/bid/67943
http://www.securitytracker.com/id/1030407

Copyright 2024, cxsecurity.com

 

Back to Top