Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Online Help System Cross-Site Scripting Vulnerability

Cisco-SA-20070315-CVE-2007-1467 · Medium · Published · Updated

Multiple Cisco products contain a vulnerability in the Online Help System that could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability exists because the search feature of the web-based Online Help System interface fails to sufficiently filter user-supplied input.  An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to follow a crafted link.  This action could allow the attacker to execute arbitrary code in a user's browser in the context of the affected site.  An exploit could allow the attacker to access sensitive browser information or take actions on the affected site as the targeted user. Cisco confirmed this vulnerability in a security response and issued approved workarounds. Attackers cannot exploit this vulnerability directly; instead, they must convince a user to follow a crafted link.  An exploit could allow the attacker to execute arbitrary script code in the context of the affected site, which may permit the attacker to access confidential browser information or take actions on the affected site as the user.  In some related applications, an attacker may make configuration changes on an affected system with the privileges of the targeted user.  This vector may require a targeted user to authenticate to an administration interface before an exploit can occur. Because many of the affected products may be considered valuable assets, this vulnerability could draw the attention of attackers that are invested in corporate espionage.  The ability to access a competitor's datastream, network, or VoIP telephone system are choice outcomes for individuals that deal in stolen information. Administrators are strongly encouraged not to follow unsolicited links while performing maintenance tasks on any of the affected systems.  Administrators should also ensure that they log out after the completion of an administration session to ensure that valid authentication cookies do not remain on administrator workstations.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply updates when they become available.

Users are advised not to visit untrusted websites.

Users are advised not to follow links from untrusted sources.  Users are advised to verify the authenticity of links prior to following them.

Administrators may consider removing or renaming the PreSearch.html and PreSearch.class files.

Administrators are advised to log out of administrative interfaces once they complete a session.

CVEsCVE-2007-1467
Cisco Bug IDsNA
CVSS ScoreBase 1.9
Product Names From Source
Cisco Secure Access Control System (ACS), Cisco VPN Client for Windows, CiscoWorks Wireless LAN Solution Engine (WLSE), Cisco Catalyst 6500 Network Analysis Module (NAM), Cisco 7600 Series Router Network Analysis Module (NAM), CiscoWorks Common Services (CS), Cisco Secure Access Control Server Solution Engine (ACSE), Cisco Wireless Control System (WCS) Software, Cisco Unified Personal Communicator, Cisco Unified MeetingPlace, Cisco Unified MeetingPlace Express, Cisco IP Communicator, Cisco Unified Videoconferencing 3545 System, Cisco Unified Videoconferencing 3540 System, Cisco Unified Videoconferencing 3515 Multipoint Control Unit (MCU), Cisco Unified Videoconferencing 3527 PRI Gateway, Cisco IP/VC 3526 PRI Gateway, Cisco Unified Videoconferencing Manager, Cisco WAN Manager, Cisco Security Device Manager, Cisco Unified Video Advantage, Cisco Unified Communications Manager, Cisco Wireless LAN Controller (WLC) 4.0.196, Cisco Wireless LAN Controller (WLC) 3.2.78.0, Cisco Wireless LAN Controller (WLC) 3.1.105.0, Cisco Wireless LAN Controller (WLC)

Related Products

Product CVE Evidence
CiscoWorks Wireless LAN Solution Engine (WLSE) CVE-2007-1467 Cisco OpenVuln
CiscoWorks Common Services (CS) CVE-2007-1467 Cisco OpenVuln
Cisco Wireless LAN Controller (WLC) CVE-2007-1467 Cisco OpenVuln
Cisco Wireless Control System (WCS) Software CVE-2007-1467 Cisco OpenVuln
Cisco WAN Manager CVE-2007-1467 Cisco OpenVuln
Cisco VPN Client for Windows CVE-2007-1467 Cisco OpenVuln
Cisco Unified Videoconferencing Manager CVE-2007-1467 Cisco OpenVuln
Cisco Unified Videoconferencing 3545 System CVE-2007-1467 Cisco OpenVuln
Cisco Unified Videoconferencing 3540 System CVE-2007-1467 Cisco OpenVuln
Cisco Unified Videoconferencing 3527 PRI Gateway CVE-2007-1467 Cisco OpenVuln
Cisco Unified Videoconferencing 3515 Multipoint Control Unit (MCU) CVE-2007-1467 Cisco OpenVuln
Cisco Unified Video Advantage CVE-2007-1467 Cisco OpenVuln
Cisco Unified Personal Communicator CVE-2007-1467 Cisco OpenVuln
Cisco Unified MeetingPlace Express CVE-2007-1467 Cisco OpenVuln
Cisco Unified MeetingPlace CVE-2007-1467 Cisco OpenVuln
Cisco Unified Communications Manager CVE-2007-1467 Cisco OpenVuln
Cisco Security Device Manager CVE-2007-1467 Cisco OpenVuln
Cisco Secure Access Control System (ACS) CVE-2007-1467 Cisco OpenVuln
Cisco Secure Access Control Server Solution Engine (ACSE) CVE-2007-1467 Cisco OpenVuln
Cisco IP/VC 3526 PRI Gateway CVE-2007-1467 Cisco OpenVuln
Cisco IP Communicator CVE-2007-1467 Cisco OpenVuln
Cisco Catalyst 6500 Network Analysis Module (NAM) CVE-2007-1467 Cisco OpenVuln
Cisco 7600 Series Router Network Analysis Module (NAM) CVE-2007-1467 Cisco OpenVuln