A vulnerability in the administrative web interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to modify a page in the web interface of the affected application.
The vulnerability is due to improper sanitization of parameter values by the affected application. An attacker could exploit this vulnerability by injecting malicious code into an affected parameter and persuading a user to access a web page that triggers the rendering of the injected code.
For additional information about HTML injection attacks and potential mitigation methods, see https://www.owasp.org/index.php/Testing_for_HTML_Injection_(OTG-CLIENT-003) ["https://www.owasp.org/index.php/Testing_for_HTML_Injection_(OTG-CLIENT-003)"].
There are no workarounds that address this vulnerability.
This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cpi ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cpi"]