A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpar-strd-xss-A4DCVETG | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-11-04 16:15
Updated : 2023-11-07 03:36
NVD link : CVE-2021-34731
Mitre link : CVE-2021-34731
CVE.ORG link : CVE-2021-34731
JSON object : View
Products Affected
cisco
- prime_access_registrar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')