A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as “<”, “>”, and “&” that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Asyncos | Cisco | 14.0.0-698 (including) | 14.0.0-698 (including) |
Asyncos | Cisco | 14.2.0-620 (including) | 14.2.0-620 (including) |
Asyncos | Cisco | 14.2.1-020 (including) | 14.2.1-020 (including) |
Asyncos | Cisco | 14.3.0-032 (including) | 14.3.0-032 (including) |
Asyncos | Cisco | 15.0.0-104 (including) | 15.0.0-104 (including) |
Asyncos | Cisco | 15.0.1-030 (including) | 15.0.1-030 (including) |
Asyncos | Cisco | 15.5.0-048 (including) | 15.5.0-048 (including) |
Asyncos | Cisco | 15.5.1-055 (including) | 15.5.1-055 (including) |