A vulnerability in the web framework of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Known Affected Releases 10.5(2). Cisco Bug IDs: CSCvf25345.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cuc | Vendor Advisory |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf25345 | Vendor Advisory |
http://www.securitytracker.com/id/1039277 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/100645 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-09-07 14:29
Updated : 2019-10-09 16:22
NVD link : CVE-2017-12212
Mitre link : CVE-2017-12212
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
cisco
- unity_connection