Lucene search

K
ciscoCiscoCISCO-SA-20070315-CVE-2007-1467
HistoryMar 15, 2007 - 8:15 p.m.

Cisco Online Help System Cross-Site Scripting Vulnerability

2007-03-1520:15:47
tools.cisco.com
9

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

84.9%

Multiple Cisco products contain a vulnerability in the Online Help System that could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks.

This vulnerability exists because the search feature of the web-based Online Help System interface fails to sufficiently filter user-supplied input. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to follow a crafted link. This action could allow the attacker to execute arbitrary code in a user’s browser in the context of the affected site. An exploit could allow the attacker to access sensitive browser information or take actions on the affected site as the targeted user.

Cisco confirmed this vulnerability in a security response and issued
approved workarounds.

Attackers cannot exploit this vulnerability directly; instead, they must convince a user to follow a crafted link. An exploit could allow the attacker to execute arbitrary script code in the context of the affected site, which may permit the attacker to access confidential browser information or take actions on the affected site as the user. In some related applications, an attacker may make configuration changes on an affected system with the privileges of the targeted user. This vector may require a targeted user to authenticate to an administration interface before an exploit can occur.

Because many of the affected products may be considered valuable assets, this vulnerability could draw the attention of attackers that are invested in corporate
espionage. The ability to access a competitor’s datastream, network, or VoIP telephone system are choice outcomes for individuals that deal in stolen information.

Administrators are strongly encouraged not to follow unsolicited links while performing maintenance tasks on any of the affected systems. Administrators should also ensure that they log out after the completion of an administration session to ensure that valid authentication cookies do not remain on administrator workstations.

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.012 Low

EPSS

Percentile

84.9%

Related for CISCO-SA-20070315-CVE-2007-1467