Assigner | cisco |
Reserved | 2023-11-08 |
Published | 2024-05-15 |
Updated | 2024-06-04 |
Description
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
11.1.0-069
11.1.0-131
11.1.0-128
12.0.0-419
12.1.0-071
12.1.0-087
12.1.0-089
13.0.0-392
13.0.5-007
13.5.1-277
13.5.4-038
12.5.0-066
12.5.4-041
12.5.3-041
14.0.0-698
14.2.0-620
14.2.1-020
14.3.0-032
15.0.0-104
15.0.1-030
15.5.0-048
11.0.0-115
11.0.1-161
11.5.1-105
12.0.0-452
12.0.1-011
12.5.0-636
12.5.0-658
12.5.0-678
12.5.0-670
13.0.0-277
13.6.2-078
13.8.1-068
13.8.1-074
13.8.1-108
12.8.1-002
12.8.1-021
14.0.0-404
14.1.0-223
14.1.0-227
14.2.0-212
14.2.0-224
14.2.1-020
14.3.0-120
15.0.0-334
References
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHOD (cisco-sa-esa-sma-wsa-xss-bgG5WHOD)