Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2014/Jun/57 | Exploit Third Party Advisory VDB Entry |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3289 | Vendor Advisory |
http://tools.cisco.com/security/center/viewAlert.x?alertId=34569 | Vendor Advisory |
http://secunia.com/advisories/58296 | Permissions Required |
http://www.securityfocus.com/bid/67943 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1030407 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/127004/Cisco-Ironport-Email-Security-Virtual-Appliance-8.0.0-671-XSS.html | |
http://www.kb.cert.org/vuls/id/613308 |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2014-06-10 04:19
Updated : 2018-10-30 09:27
NVD link : CVE-2014-3289
Mitre link : CVE-2014-3289
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
cisco
- content_security_management_appliance
- email_security_appliance_firmware
- ironport_asyncos
- web_security_appliance