多款Cisco产品跨站脚本执行漏洞
CVE编号
CVE-2020-3282利用情况
暂无补丁情况
N/A披露时间
2020-07-03漏洞描述
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager | * | From (including) 10.5\(2\) | Up to (excluding) 10.5\(2\)su10 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager | * | From (including) 11.5\(1\) | Up to (excluding) 11.5\(1\)su8 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager | 12.0(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager | 12.5(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager_im_and_presence_service | * | From (including) 10.5\(2\) | Up to (excluding) 10.5\(2\)su10 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager_im_and_presence_service | * | From (including) 11.5\(1\) | Up to (excluding) 11.5\(1\)su8 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager_im_and_presence_service | 12.0(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unified_communications_manager_im_and_presence_service | 12.5(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | * | From (including) 10.5\(2\) | Up to (excluding) 10.5\(2\)su10 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | * | From (including) 11.5\(1\) | Up to (excluding) 11.5\(1\)su8 | ||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 12.0(1) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | unity_connection | 12.5(1) | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-79 | 在Web页面生成时对输入的转义处理不恰当(跨站脚本) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论