Security-Alerts mailing list archive (security-alerts@yandex-team.ru)
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[security-alerts] FW: [SA24499] Cisco Multiple Products Online Help System Cross-Site Scripting
Глубоко копают...
С другой стороны признак того, что к XSS начинают относться серьезнее.
>
> TITLE:
> Cisco Multiple Products Online Help System Cross-Site Scripting
>
> SECUNIA ADVISORY ID:
> SA24499
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Less critical
>
> IMPACT:
> Cross Site Scripting
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Cisco 2000 Series Wireless LAN Controller
>
> Cisco Unified Videoconferencing 3500 Series Products
>
> Cisco Secure ACS Solution Engine 4.x
>
>
> SOFTWARE:
> CiscoWorks Monitoring Center for Security 1.x
>
> CiscoWorks Management Center for IPS Sensors (IPSMC) 2.x
>
> CiscoWorks Internetwork Performance Monitor (IPM) 2.x
>
> CiscoWorks Common Services Software 3.x
>
> CiscoWorks Common Services Software 2.x
>
> CiscoWorks Common Services Software 1.x
>
> CiscoWorks Campus Manager 4.x
>
> CiscoWorks Campus Manager 3.x
>
> Cisco WAN Manager (CWM) 15.x
>
> Cisco WAN Manager (CWM) 12.x
>
> Cisco WAN Manager (CWM) 11.x
>
> Cisco WAN Manager (CWM) 10.x
>
> Cisco VPN Client 2.x
>
> Cisco VPN 5000 Client 5.x
>
> Cisco Unified Video Advantage 2.x
>
> Cisco Unified Personal Communicator 1.x
>
> Cisco Unified MeetingPlace Express 2.x
>
> Cisco Unified MeetingPlace Express 1.x
>
> Cisco Unified MeetingPlace 6.x
>
> Cisco Unified MeetingPlace 5.x
>
> Cisco Unified MeetingPlace 4.x
>
> Cisco Unified CallManager 5.x
>
> Cisco Unified CallManager 4.x
>
> Cisco Secure ACS 4.x
>
> Cisco IP Communicator 2.x
>
> Cisco IP Communicator 1.x
>
> Cisco Catalyst 6500 Series Network Analysis Module (NAM-1/NAM-2)
>
> Cisco CallManager 5.x
>
> Cisco CallManager 4.x
>
> Cisco CallManager 3.x
>
> CiscoWorks Monitoring Center for Security 2.x
>
> Cisco Router and Security Device Manager (SDM)
>
>
> DESCRIPTION:
> A vulnerability has been reported in various Cisco products, which
> can be exploited by malicious people to conduct cross-site scripting
> attacks.
>
> Input passed to the search code of PreSearch.html or PreSearch.class
> (depending on software or device) is not properly sanitised before
> being returned to the user. This can be exploited to execute
> arbitrary HTML and script code in a user's browser session in context
> of an affected software or device.
>
> SOLUTION:
> If possible, the vendor recommends deleting or renaming the
> PreSearch.html and PreSearch.class files.
>
> PROVIDED AND/OR DISCOVERED BY:
> Independently discovered by Erwin Paternotte from Fox-IT and Cassio
> Goldschmidt.
>
> ORIGINAL ADVISORY:
>
>
|