CVE Vulnerabilities

CVE-2021-1359

Missing XML Validation

Published: Jul 08, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
9 HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability.

Weakness

The product accepts XML from an untrusted source but does not validate the XML against the proper schema.

Affected Software

Name Vendor Start Version End Version
Web_security_appliance Cisco 11.8.0-429 (including) 11.8.0-429 (including)
Web_security_appliance Cisco 11.8.0-453 (including) 11.8.0-453 (including)
Asyncos Cisco 11.8.0 (including) 12.0.3-005 (excluding)
Asyncos Cisco 12.5.0 (including) 12.5.2 (excluding)

Potential Mitigations

  • Always validate XML input against a known XML Schema or DTD.
  • It is not possible for an XML parser to validate all aspects of a document’s content because a parser cannot understand the complete semantics of the data. However, a parser can do a complete and thorough job of checking the document’s structure and therefore guarantee to the code that processes the document that the content is well-formed.

References