Lucene search

K
ciscoCiscoCISCO-SA-20151023-ACS_XSS
HistoryOct 26, 2015 - 12:00 a.m.

Cisco Secure Access Control Server Dom-Based Cross-Site Scripting Vulnerability

2015-10-2600:00:00
tools.cisco.com
17

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.1%

A vulnerability in the Cisco Secure Access Control Server (ACS) web interface could allow an unauthenticated, remote attacker to impact the integrity of the system by executing a Document Object Model (DOM)-based, environment or client side, cross-site scripting (XSS) attack.

The vulnerability is due to a lack of input validation on user-supplied data within the DOM input. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious DOM statements to the affected system. A successful exploit could allow the attacker to effect the integrity of the system via database manipulation.

Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_xss”]

Affected configurations

Vulners
Node
ciscosecure_access_control_server_solution_engineMatchany
OR
ciscosecure_access_control_server_solution_engineMatchany

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.1%

Related for CISCO-SA-20151023-ACS_XSS