Vulnerability Name:

CVE-2007-1467 (CCN-33024)

Assigned:2007-03-15
Published:2007-03-15
Updated:2018-10-16
Summary:Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
CVSS v3 Severity:4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-1467

Source: CCN
Type: SA24499
Cisco Multiple Products Online Help System Cross-Site Scripting

Source: SECUNIA
Type: UNKNOWN
24499

Source: SREASON
Type: UNKNOWN
2437

Source: CCN
Type: SECTRACK ID: 1017778
Cisco Online Help System Input Validation Hole Permits Cross-Site Scripting Attacks Against Several Cisco Products

Source: CISCO
Type: Vendor Advisory
20070315 Cross-Site Scripting Vulnerability in Online Help System

Source: CCN
Type: cisco-sr-20070315-xss
Cisco Security Response: Cross-Site Scripting Vulnerability in Online Help System

Source: CCN
Type: OSVDB ID: 34124
Cisco Multiple Products Online Help System PreSearch.html XSS

Source: CCN
Type: OSVDB ID: 34125
Cisco Multiple Products Online Help System PreSearch.class XSS

Source: BUGTRAQ
Type: UNKNOWN
20070315 XSS vulnerability in the online help system of several Cisco products

Source: BUGTRAQ
Type: UNKNOWN
20070315 Re: XSS vulnerability in the online help system of several Cisco products

Source: BID
Type: UNKNOWN
22982

Source: CCN
Type: BID-22982
Multiple Cisco Products Online Help Cross Site Scripting Vulnerability

Source: SECTRACK
Type: UNKNOWN
1017778

Source: VUPEN
Type: UNKNOWN
ADV-2007-0973

Source: XF
Type: UNKNOWN
cisco-presearch-xss(33024)

Source: XF
Type: UNKNOWN
cisco-presearch-xss(33024)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cisco:acs_solution_engine:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:acs_solution_engine:4.1:*:windows:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ip_communicator:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:meetingplace:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:security_device_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_meetingplace:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_meetingplace_express:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_personal_communicator:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_video_advantage:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_videoconferencing:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_videoconferencing_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.1:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.1:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2b:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2b:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.2b:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.4:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.4:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.5.4:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6.1:*:linux:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6.1:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:3.6.1:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:4.0.2a:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:4.0.2a:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:4.0.2c:*:mac_os_x:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:4.0.2c:*:solaris:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:4.8.1:*:windows:*:*:*:*:*
  • OR cpe:/a:cisco:wan_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:wireless_lan_controllers:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:wireless_lan_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:call_manager:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:network_analysis_module:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:wireless_control_system:4.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:cisco:network_analysis_module:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_callmanager:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:meetingplace:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:vpn_client:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_common_services:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:secure_access_control_server:4.1.2:-:windows:*:*:*:*:*
  • OR cpe:/a:cisco:ip_communicator:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:security_device_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:security_monitoring_analysis_and_response_system:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_lms:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco acs solution engine 4.1
    cisco acs solution engine 4.1
    cisco ciscoworks *
    cisco ip communicator *
    cisco meetingplace *
    cisco security device manager *
    cisco unified meetingplace *
    cisco unified meetingplace express *
    cisco unified personal communicator *
    cisco unified video advantage *
    cisco unified videoconferencing *
    cisco unified videoconferencing manager *
    cisco vpn client 3.5.1
    cisco vpn client 3.5.1
    cisco vpn client 3.5.2
    cisco vpn client 3.5.2
    cisco vpn client 3.5.2
    cisco vpn client 3.5.2b
    cisco vpn client 3.5.2b
    cisco vpn client 3.5.2b
    cisco vpn client 3.5.4
    cisco vpn client 3.5.4
    cisco vpn client 3.5.4
    cisco vpn client 3.6
    cisco vpn client 3.6
    cisco vpn client 3.6
    cisco vpn client 3.6.1
    cisco vpn client 3.6.1
    cisco vpn client 3.6.1
    cisco vpn client 4.0.2a
    cisco vpn client 4.0.2a
    cisco vpn client 4.0.2c
    cisco vpn client 4.0.2c
    cisco vpn client 4.8.1
    cisco wan manager *
    cisco wireless lan controllers *
    cisco wireless lan solution engine *
    cisco call manager *
    cisco network analysis module *
    cisco wireless control system 4.0
    cisco network analysis module *
    cisco unified callmanager -
    cisco meetingplace *
    cisco vpn client *
    cisco ciscoworks common services -
    cisco secure access control server 4.1.2 -
    cisco ip communicator *
    cisco security device manager *
    cisco ciscoworks *
    cisco security monitoring analysis and response system *
    cisco ciscoworks lms -