ID

VAR-201502-0151


CVE

CVE-2015-0623


TITLE

Cisco Web Security The appliance Run on device Administrator Report page cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-001552

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Administrator report page on Cisco Web Security Appliance (WSA) devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus40627. Vendors have confirmed this vulnerability Bug ID CSCus40627 It is released as.By any third party Web Script or HTML May be inserted. The Cisco Web Security Appliance is a secure Web gateway that integrates malware protection, application visualization control, policy control, and more on a single platform. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCus40627

Trust: 2.52

sources: NVD: CVE-2015-0623 // JVNDB: JVNDB-2015-001552 // CNVD: CNVD-2015-01212 // BID: 72663 // VULHUB: VHN-78569

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-01212

AFFECTED PRODUCTS

vendor:ciscomodel:web security appliancescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:web security the appliancescope:eqversion:8.0(.6)

Trust: 0.8

vendor:ciscomodel:web security appliancescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-01212 // JVNDB: JVNDB-2015-001552 // CNNVD: CNNVD-201502-418 // NVD: CVE-2015-0623

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0623
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0623
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01212
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201502-418
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78569
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0623
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01212
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78569
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-01212 // VULHUB: VHN-78569 // JVNDB: JVNDB-2015-001552 // CNNVD: CNNVD-201502-418 // NVD: CVE-2015-0623

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-78569 // JVNDB: JVNDB-2015-001552 // NVD: CVE-2015-0623

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-418

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201502-418

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001552

PATCH

title:Cisco Web Security Appliance Cross-Site Scripting Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0623

Trust: 0.8

title:37514url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37514

Trust: 0.8

title:Patch for Cisco Web Security Appliance Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/55481

Trust: 0.6

sources: CNVD: CNVD-2015-01212 // JVNDB: JVNDB-2015-001552

EXTERNAL IDS

db:NVDid:CVE-2015-0623

Trust: 3.4

db:BIDid:72663

Trust: 1.0

db:JVNDBid:JVNDB-2015-001552

Trust: 0.8

db:CNNVDid:CNNVD-201502-418

Trust: 0.7

db:CNVDid:CNVD-2015-01212

Trust: 0.6

db:VULHUBid:VHN-78569

Trust: 0.1

sources: CNVD: CNVD-2015-01212 // VULHUB: VHN-78569 // BID: 72663 // JVNDB: JVNDB-2015-001552 // CNNVD: CNNVD-201502-418 // NVD: CVE-2015-0623

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0623

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0623

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0623

Trust: 0.8

url:http://www.securityfocus.com/bid/72663

Trust: 0.6

url:www.cisco.com

Trust: 0.3

sources: CNVD: CNVD-2015-01212 // VULHUB: VHN-78569 // BID: 72663 // JVNDB: JVNDB-2015-001552 // CNNVD: CNNVD-201502-418 // NVD: CVE-2015-0623

CREDITS

Cisco

Trust: 0.3

sources: BID: 72663

SOURCES

db:CNVDid:CNVD-2015-01212
db:VULHUBid:VHN-78569
db:BIDid:72663
db:JVNDBid:JVNDB-2015-001552
db:CNNVDid:CNNVD-201502-418
db:NVDid:CVE-2015-0623

LAST UPDATE DATE

2024-11-23T22:13:32.176000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01212date:2015-02-27T00:00:00
db:VULHUBid:VHN-78569date:2015-02-19T00:00:00
db:BIDid:72663date:2015-03-19T07:31:00
db:JVNDBid:JVNDB-2015-001552date:2015-02-23T00:00:00
db:CNNVDid:CNNVD-201502-418date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0623date:2024-11-21T02:23:25.780

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-01212date:2015-02-27T00:00:00
db:VULHUBid:VHN-78569date:2015-02-19T00:00:00
db:BIDid:72663date:2015-02-18T00:00:00
db:JVNDBid:JVNDB-2015-001552date:2015-02-23T00:00:00
db:CNNVDid:CNNVD-201502-418date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0623date:2015-02-19T00:59:01.227