A vulnerability in the WebVPN web-based management interface of Cisco Adaptive Security Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvg33985.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103932 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040713 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asawvpn | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-04-19 20:29
Updated : 2023-08-15 15:21
NVD link : CVE-2018-0242
Mitre link : CVE-2018-0242
CVE.ORG link : CVE-2018-0242
JSON object : View
Products Affected
cisco
- asa_5506-x
- asa_5512-x
- asa_5525-x
- asa_5545-x
- asa_5508-x
- asa_5585-x
- asa_5516-x
- asa_5506w-x
- adaptive_security_appliance_software
- asa_5506h-x
- asa_5515-x
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')