Cross Site Scripting in CiscoWorks

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

December 5th, 2007 ======= Summary ======= Name: Cross Site Scripting in CiscoWorks Release Date: 05 December 2007 Reference: LSD001-2007 Discover: Dave Lewis Vendor: Cisco Systems Affected: CiscoWorks version 2.6 (as tested) All prior builds are affected Risk: Medium Status: Published Reference: g-in-ciscoworks/ ======== TimeLine ======== Discovered: 20 August 2007 Reported: 24 September 2007 Fixed: 5 November 2007 Patch Release: 5 December 2007 Published: 5 December 2007 =========== Description =========== The initial CiscoWorks login page is susceptible to XSS attack. Impact: attackers could execute XSS attacks that can harvest session cookies and usernames/passwords. ================= Technical Details ================= The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request. Input is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session. =============== Fix Information =============== This issue has now been resolved. The patch may be obtained from: =============================== I would like to thank Cisco for their prompt and professional response to this issue. =============================== Liquidmatrix Security Digest 2255B Queen Street East suite 156 Toronto, Ontario Canada M4E 1G3

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top