ID CVE-2015-4294 Type cve Reporter cve@mitre.org Modified 2015-08-21T16:10:00
Description
Cross-site scripting (XSS) vulnerability in Cisco IM and Presence Service before 10.5 MR1 allows remote attackers to inject arbitrary web script or HTML by constructing a crafted URL that leverages incomplete filtering of HTML elements, aka Bug ID CSCut41766.
{"id": "CVE-2015-4294", "bulletinFamily": "NVD", "title": "CVE-2015-4294", "description": "Cross-site scripting (XSS) vulnerability in Cisco IM and Presence Service before 10.5 MR1 allows remote attackers to inject arbitrary web script or HTML by constructing a crafted URL that leverages incomplete filtering of HTML elements, aka Bug ID CSCut41766.", "published": "2015-08-01T01:59:00", "modified": "2015-08-21T16:10:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4294", "reporter": "cve@mitre.org", "references": ["http://tools.cisco.com/security/center/viewAlert.x?alertId=40217", "http://www.securitytracker.com/id/1033171"], "cvelist": ["CVE-2015-4294"], "type": "cve", "lastseen": "2020-10-03T12:49:51", "edition": 3, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cisco", "idList": ["CISCO-SA-20150730-CVE-2015-4294"]}], "modified": "2020-10-03T12:49:51", "rev": 2}, "score": {"value": 4.1, "vector": "NONE", "modified": "2020-10-03T12:49:51", "rev": 2}, "vulnersScore": 4.1}, "cpe": ["cpe:/a:cisco:unified_communications_manager_im_and_presence_service:9.0\\(1\\)", "cpe:/a:cisco:unified_communications_manager_im_and_presence_service:10.5\\(1\\)", "cpe:/a:cisco:unified_communications_manager_im_and_presence_service:9.1\\(1\\)"], "affectedSoftware": [{"cpeName": "cisco:unified_communications_manager_im_and_presence_service", "name": "cisco unified communications manager im and presence service", "operator": "eq", "version": "9.1\\(1\\)"}, {"cpeName": "cisco:unified_communications_manager_im_and_presence_service", "name": "cisco unified communications manager im and presence service", "operator": "eq", "version": "10.5\\(1\\)"}, {"cpeName": "cisco:unified_communications_manager_im_and_presence_service", "name": "cisco unified communications manager im and presence service", "operator": "eq", "version": "9.0\\(1\\)"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {}, "cpe23": ["cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:10.5\\(1\\):*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:10.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:9.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"cisco": [{"lastseen": "2020-12-24T11:41:34", "bulletinFamily": "software", "cvelist": ["CVE-2015-4294"], "description": "Cisco IM and Presence Service contains a reflected cross-site scripting (XSS) vulnerability that could allow an unauthenticated, remote attacker to preform an XSS attack on an authenticated user.\n\nThe vulnerability is due to an incomplete user input filter that may not filter certain HTML or script tags. An attacker who can convince an authenticated administrator to follow a malicious link or visit an attacker-controlled website could cause arbitrary HTML or script content to be executed in the security context of the affected site on the user's browser.\n\nCisco has confirmed the vulnerability and released software updates.\n\nTo exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.\n\nCisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.", "modified": "2015-07-30T20:05:16", "published": "2015-07-30T20:05:22", "id": "CISCO-SA-20150730-CVE-2015-4294", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150730-CVE-2015-4294", "type": "cisco", "title": "Cisco IM and Presence Service Reflected Cross-Site Scripting Vulnerability", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}