ID

VAR-201502-0152


CVE

CVE-2015-0624


TITLE

Cisco AsyncOS Web Framework Input Validation Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2015-01347 // CNNVD: CNNVD-201502-379

DESCRIPTION

The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. Vendors have confirmed this vulnerability CSCur44412 , CSCur44415 , CSCur89630 , CSCur89636 , CSCur89633 ,and CSCur89639 It is released as.Skillfully crafted by a third party HTTP A redirect may be triggered via the header. Cisco AsyncOS is a set of operating systems used in these products. Cisco AsyncOS Software is prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input. An attacker can leverage this issue to conduct phishing attacks; other attacks are possible. This issue is being tracked by Cisco Bug ID's CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. The following products are affected: ESA, Content SMA, WSA

Trust: 2.61

sources: NVD: CVE-2015-0624 // JVNDB: JVNDB-2015-001580 // CNVD: CNVD-2015-01347 // BID: 72702 // VULHUB: VHN-78570 // VULMON: CVE-2015-0624

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-01347

AFFECTED PRODUCTS

vendor:ciscomodel:email security appliancescope:eqversion: -

Trust: 2.2

vendor:ciscomodel:web security appliancescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:content security management appliancescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:asyncosscope:lteversion:asyncos 8.5

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope:lteversion:(asyncos 8.5 )

Trust: 0.8

vendor:ciscomodel:web security the appliancescope:lteversion:(asyncos 8.5 )

Trust: 0.8

vendor:ciscomodel:content security management appliancescope:lteversion:(asyncos 8.3 )

Trust: 0.8

vendor:ciscomodel:content security management appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:web security appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:email security appliancescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-01347 // JVNDB: JVNDB-2015-001580 // CNNVD: CNNVD-201502-379 // NVD: CVE-2015-0624

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0624
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0624
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01347
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201502-379
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78570
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-0624
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0624
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-01347
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78570
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-01347 // VULHUB: VHN-78570 // VULMON: CVE-2015-0624 // JVNDB: JVNDB-2015-001580 // CNNVD: CNNVD-201502-379 // NVD: CVE-2015-0624

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78570 // JVNDB: JVNDB-2015-001580 // NVD: CVE-2015-0624

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-379

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201502-379

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001580

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-78570

PATCH

title:Cisco AsyncOS Software HTTP Redirect Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0624

Trust: 0.8

title:37544url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37544

Trust: 0.8

title:Cisco AsyncOS Web Framework Input Patch for Validation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/55644

Trust: 0.6

sources: CNVD: CNVD-2015-01347 // JVNDB: JVNDB-2015-001580

EXTERNAL IDS

db:NVDid:CVE-2015-0624

Trust: 3.5

db:BIDid:72702

Trust: 1.5

db:PACKETSTORMid:130525

Trust: 1.2

db:SECTRACKid:1031781

Trust: 1.2

db:SECTRACKid:1031782

Trust: 1.2

db:JVNDBid:JVNDB-2015-001580

Trust: 0.8

db:CNNVDid:CNNVD-201502-379

Trust: 0.7

db:CNVDid:CNVD-2015-01347

Trust: 0.6

db:VULHUBid:VHN-78570

Trust: 0.1

db:VULMONid:CVE-2015-0624

Trust: 0.1

sources: CNVD: CNVD-2015-01347 // VULHUB: VHN-78570 // VULMON: CVE-2015-0624 // BID: 72702 // JVNDB: JVNDB-2015-001580 // CNNVD: CNNVD-201502-379 // NVD: CVE-2015-0624

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0624

Trust: 2.4

url:http://www.securityfocus.com/bid/72702

Trust: 1.3

url:http://packetstormsecurity.com/files/130525/cisco-ironport-asyncos-http-header-injection.html

Trust: 1.3

url:http://www.securitytracker.com/id/1031781

Trust: 1.2

url:http://www.securitytracker.com/id/1031782

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0624

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0624

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2015-01347 // VULHUB: VHN-78570 // VULMON: CVE-2015-0624 // BID: 72702 // JVNDB: JVNDB-2015-001580 // CNNVD: CNNVD-201502-379 // NVD: CVE-2015-0624

CREDITS

Glafkos Charalambous

Trust: 0.3

sources: BID: 72702

SOURCES

db:CNVDid:CNVD-2015-01347
db:VULHUBid:VHN-78570
db:VULMONid:CVE-2015-0624
db:BIDid:72702
db:JVNDBid:JVNDB-2015-001580
db:CNNVDid:CNNVD-201502-379
db:NVDid:CVE-2015-0624

LAST UPDATE DATE

2024-11-23T22:42:30.199000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01347date:2015-02-28T00:00:00
db:VULHUBid:VHN-78570date:2018-10-30T00:00:00
db:VULMONid:CVE-2015-0624date:2018-10-30T00:00:00
db:BIDid:72702date:2015-03-08T16:02:00
db:JVNDBid:JVNDB-2015-001580date:2015-02-25T00:00:00
db:CNNVDid:CNNVD-201502-379date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0624date:2024-11-21T02:23:25.880

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-01347date:2015-02-28T00:00:00
db:VULHUBid:VHN-78570date:2015-02-21T00:00:00
db:VULMONid:CVE-2015-0624date:2015-02-21T00:00:00
db:BIDid:72702date:2015-02-20T00:00:00
db:JVNDBid:JVNDB-2015-001580date:2015-02-25T00:00:00
db:CNNVDid:CNNVD-201502-379date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0624date:2015-02-21T11:59:02.920