Vulnerability CVE-2015-0624


Published: 2015-02-21

Description:
The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Cisco Ironport AsyncOS HTTP Header Injection
Glafkos Charalam...
25.02.2015

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Cisco -> Content security management appliance 
Cisco -> Email security appliance 
Cisco -> Web security appliance 
Cisco -> Email security appliance firmware 

 References:
http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0624
http://www.securityfocus.com/bid/72702
http://www.securitytracker.com/id/1031781
http://www.securitytracker.com/id/1031782

Copyright 2024, cxsecurity.com

 

Back to Top