Vulnerability Name: | CCN-110718 | ||||||
Published: | 2016-02-17 | ||||||
Updated: | 2016-02-17 | ||||||
Summary: | Cisco ASA is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the VPN Portal password recovery page. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | ||||||
CVSS v3 Severity: | 6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
| ||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||
References: | Source: CCN Type: Cisco Web site ASA Source: XF Type: UNKNOWN cisco-asa-vpn-xss(110718) Source: CCN Type: Packet Storm Security [02-17-2016] Cisco ASA VPN Portal Cross Site Scripting | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |