ID

VAR-201206-0042


CVE

CVE-2011-2545


TITLE

plural Cisco Product SIP Implementation of cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-002724

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the SIP implementation on the Cisco SPA8000 and SPA8800 before 6.1.11, SPA2102 and SPA3102 before 5.2.13, and SPA 500 series IP phones before 7.4.9 allows remote attackers to inject arbitrary web script or HTML via the FROM field of an INVITE message, aka Bug IDs CSCtr27277, CSCtr27256, CSCtr27274, and CSCtr14715. plural Cisco Product SIP An implementation of contains a cross-site scripting vulnerability. The problem is Bug ID CSCtr27277 , CSCtr27256 , CSCtr27274 ,and CSCtr14715 It is a problem.By a third party INVITE Message FROM Any through the field Web Script or HTML May be inserted. Cisco Small Business Voice Gateways and ATAs and Cisco Small Business SPA 500 Series IP Phones are Cisco's IP telephony solutions. Due to the lack of adequate filtering of user input to the SIP INVITE message FROM field (especially the Display Name and User ID parameters), an unverified remote attacker can send a specially crafted SIP INVITE message to entice the user to access the affected device call log WEB page when malicious When a message is processed by an affected device, the application returns a response containing the malicious code provided by the attacker to the user and causes the malicious code to execute on the target user's browser. is prone to a cross-site scripting vulnerability. Also known as Bug IDs CSCtr27277, CSCtr27256, CSCtr27274 and CSCtr14715

Trust: 2.52

sources: NVD: CVE-2011-2545 // JVNDB: JVNDB-2012-002724 // CNVD: CNVD-2012-3171 // BID: 73800 // VULHUB: VHN-50490

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-3171

AFFECTED PRODUCTS

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.4.7

Trust: 1.6

vendor:ciscomodel:spa3102 voice gateway with routerscope:eqversion:3.3.6

Trust: 1.6

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.3.7

Trust: 1.6

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.4.4

Trust: 1.6

vendor:ciscomodel:spa3102 voice gateway with routerscope:eqversion:5.1.7

Trust: 1.6

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.4.6

Trust: 1.6

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.4.3

Trust: 1.6

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope:ltversion:6.1.11

Trust: 1.4

vendor:ciscomodel:spa8800 ip telephony gatewayscope:ltversion:6.1.11

Trust: 1.4

vendor:ciscomodel:spa2102 phone adapter with routerscope:ltversion:5.2.13

Trust: 1.4

vendor:ciscomodel:spa3102 voice gateway with routerscope:ltversion:5.2.13

Trust: 1.4

vendor:ciscomodel:spa2102 phone adapter with routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:spa 504g 4-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa2102 phone adapter with routerscope:lteversion:5.2.12

Trust: 1.0

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope:lteversion:6.1.10

Trust: 1.0

vendor:ciscomodel:spa2102 phone adapter with routerscope:eqversion:5.2.10

Trust: 1.0

vendor:ciscomodel:spa 501g 8-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 509g 12-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 525g 5-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 525g2 5-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope:eqversion:5.1.12

Trust: 1.0

vendor:ciscomodel:spa 512g 1-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 502g 1-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 508g 8-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa 514g 4-line ip phonescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:spa3102 voice gateway with routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:spa2102 phone adapter with routerscope:eqversion:5.2.5

Trust: 1.0

vendor:ciscomodel:spa8800 8-port ip telephony gatewayscope:lteversion:6.1.7

Trust: 1.0

vendor:ciscomodel:spa3102 voice gateway with routerscope:lteversion:5.1.10

Trust: 1.0

vendor:ciscomodel:spa8800 ip telephony gatewayscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:spa2102 phone adapter with routerscope:eqversion:5.2.3

Trust: 1.0

vendor:ciscomodel:spa 500 series ip phonescope:lteversion:7.4.8

Trust: 1.0

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope:eqversion:6.1.3

Trust: 1.0

vendor:ciscomodel:small business spa500 series ip phonescope:ltversion:7.4.9

Trust: 0.8

vendor:ciscomodel:spa 501g 8-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 502g 1-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 504g 4-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 508g 8-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 509g 12-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 512g 1-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 514g 4-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 525g 5-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 525g2 5-line ip phonescope: - version: -

Trust: 0.8

vendor:ciscomodel:spa2102 phone adapter with routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:spa3102 voice gateway with routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:spa8000 8-port ip telephony gatewayscope: - version: -

Trust: 0.8

vendor:ciscomodel:spa8800 ip telephony gatewayscope: - version: -

Trust: 0.8

vendor:ciscomodel:small business spa series ip phonesscope:eqversion:500<7.4.9

Trust: 0.6

vendor:ciscomodel:spa 500 series ip phonescope:eqversion:7.4.8

Trust: 0.6

vendor:ciscomodel:spa2102 phone adapter with routerscope:eqversion:5.2.12

Trust: 0.6

vendor:ciscomodel:spa3102 voice gateway with routerscope:eqversion:5.1.10

Trust: 0.6

sources: CNVD: CNVD-2012-3171 // JVNDB: JVNDB-2012-002724 // CNNVD: CNNVD-201206-195 // NVD: CVE-2011-2545

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2545
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-2545
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201206-195
value: MEDIUM

Trust: 0.6

VULHUB: VHN-50490
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-2545
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-50490
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-50490 // JVNDB: JVNDB-2012-002724 // CNNVD: CNNVD-201206-195 // NVD: CVE-2011-2545

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-50490 // JVNDB: JVNDB-2012-002724 // NVD: CVE-2011-2545

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-195

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201206-195

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002724

PATCH

title:26037url:http://tools.cisco.com/security/center/viewAlert.x?alertId=26037

Trust: 0.8

title:Patch for Cisco Small Business Device Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/18036

Trust: 0.6

sources: CNVD: CNVD-2012-3171 // JVNDB: JVNDB-2012-002724

EXTERNAL IDS

db:NVDid:CVE-2011-2545

Trust: 3.4

db:JVNDBid:JVNDB-2012-002724

Trust: 0.8

db:CNNVDid:CNNVD-201206-195

Trust: 0.7

db:CNVDid:CNVD-2012-3171

Trust: 0.6

db:BIDid:73800

Trust: 0.4

db:VULHUBid:VHN-50490

Trust: 0.1

sources: CNVD: CNVD-2012-3171 // VULHUB: VHN-50490 // BID: 73800 // JVNDB: JVNDB-2012-002724 // CNNVD: CNNVD-201206-195 // NVD: CVE-2011-2545

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=26037

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2545

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2545

Trust: 0.8

sources: CNVD: CNVD-2012-3171 // VULHUB: VHN-50490 // BID: 73800 // JVNDB: JVNDB-2012-002724 // CNNVD: CNNVD-201206-195 // NVD: CVE-2011-2545

CREDITS

Unknown

Trust: 0.3

sources: BID: 73800

SOURCES

db:CNVDid:CNVD-2012-3171
db:VULHUBid:VHN-50490
db:BIDid:73800
db:JVNDBid:JVNDB-2012-002724
db:CNNVDid:CNNVD-201206-195
db:NVDid:CVE-2011-2545

LAST UPDATE DATE

2024-11-23T22:39:13.763000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-3171date:2012-06-18T00:00:00
db:VULHUBid:VHN-50490date:2012-06-14T00:00:00
db:BIDid:73800date:2012-06-13T00:00:00
db:JVNDBid:JVNDB-2012-002724date:2012-06-15T00:00:00
db:CNNVDid:CNNVD-201206-195date:2012-06-14T00:00:00
db:NVDid:CVE-2011-2545date:2024-11-21T01:28:29.980

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-3171date:2012-06-18T00:00:00
db:VULHUBid:VHN-50490date:2012-06-13T00:00:00
db:BIDid:73800date:2012-06-13T00:00:00
db:JVNDBid:JVNDB-2012-002724date:2012-06-15T00:00:00
db:CNNVDid:CNNVD-201206-195date:2012-06-14T00:00:00
db:NVDid:CVE-2011-2545date:2012-06-13T20:55:01.707