Cisco FireSIGHT Management Center Cross-Site Scripting Vulnerability

Cisco-SA-20150608-CVE-2015-0737 · Medium · Published · Updated

A vulnerability in the Cisco FireSIGHT Management Center could allow an authenticated, remote attacker to perform cross-site scripting (XSS) attacks.   The vulnerability is due to insufficient input validation of some parameters passed via HTTP GET or POST methods. An attacker could exploit this vulnerability by intercepting the user packets and injecting malicious code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available. Cisco would like to give credit to Liad Mizrachi & Oded Vanunu from The Check Point Security Research Team for reporting this vulnerability.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Users should verify that unsolicited links are safe to follow.

For additional information about XSS attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectorshttp://www.cisco.com/c/en/us/support/docs/cmb/cisco-amb-20060922-understanding-xss.html .

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0737
Cisco Bug IDsCSCuu11099 , CSCuu91326 , CSCuu91342
CVSS ScoreBase 3.5
Base 3.5 AV:N/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C

Public Affected Products