Cisco FireSIGHT Management Center XSS and HTML Injection Vulnerabilities

Cisco-SA-20150603-CVE-2015-0766 · Medium · Published · Updated

Multiple vulnerabilities in the administrative web interface of the Cisco FireSIGHT Management Center could allow an attacker to conduct both cross-site scripting (XSS) and also arbitrary HTML command injection attacks. These vulnerabilities are due to improper user input validation. An attacker could exploit this vulnerability by crafting input into the affected fields of the web interface. Cisco has confirmed the vulnerabilities and released software updates. To exploit these vulnerabilities, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.

Users should verify that unsolicited links are safe to follow.

For additional information about XSS attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectorshttp://www.cisco.com/c/en/us/support/docs/cmb/cisco-amb-20060922-understanding-xss.html .

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0766
Cisco Bug IDsCSCus04436 , CSCus93566 , CSCut31557 , CSCut47196 , CSCuu43794 , CSCuu90178
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C

Public Affected Products