ID

VAR-201502-0154


CVE

CVE-2015-0628


TITLE

Cisco Web Security Vulnerability that bypasses proxy restrictions in the proxy engine of appliance devices

Trust: 0.8

sources: JVNDB: JVNDB-2015-001573

DESCRIPTION

The proxy engine on Cisco Web Security Appliance (WSA) devices allows remote attackers to bypass intended proxying restrictions via a malformed HTTP method, aka Bug ID CSCus79174. The Cisco Web Security Appliance is a secure Web gateway that integrates malware protection, application visualization control, policy control, and more on a single platform. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCus79174. The vulnerability is caused by the program not properly handling malformed HTTP methods

Trust: 2.52

sources: NVD: CVE-2015-0628 // JVNDB: JVNDB-2015-001573 // CNVD: CNVD-2015-01214 // BID: 72688 // VULHUB: VHN-78574

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-01214

AFFECTED PRODUCTS

vendor:ciscomodel:web security appliancescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:web security the appliancescope:eqversion:8.5

Trust: 0.8

vendor:ciscomodel:web security appliancescope: - version: -

Trust: 0.6

vendor:ciscomodel:web security appliancescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2015-01214 // BID: 72688 // JVNDB: JVNDB-2015-001573 // CNNVD: CNNVD-201502-398 // NVD: CVE-2015-0628

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0628
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0628
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01214
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201502-398
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78574
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0628
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01214
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78574
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-01214 // VULHUB: VHN-78574 // JVNDB: JVNDB-2015-001573 // CNNVD: CNNVD-201502-398 // NVD: CVE-2015-0628

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-78574 // JVNDB: JVNDB-2015-001573 // NVD: CVE-2015-0628

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-398

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201502-398

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001573

PATCH

title:Cisco Collaboration Desk Experience Endpoints Command Injection Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0628

Trust: 0.8

title:37533url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37533

Trust: 0.8

title:Cisco Web Security Appliance Remote Security Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/55483

Trust: 0.6

sources: CNVD: CNVD-2015-01214 // JVNDB: JVNDB-2015-001573

EXTERNAL IDS

db:NVDid:CVE-2015-0628

Trust: 3.4

db:BIDid:72688

Trust: 1.0

db:JVNDBid:JVNDB-2015-001573

Trust: 0.8

db:CNVDid:CNVD-2015-01214

Trust: 0.6

db:CNNVDid:CNNVD-201502-398

Trust: 0.6

db:VULHUBid:VHN-78574

Trust: 0.1

sources: CNVD: CNVD-2015-01214 // VULHUB: VHN-78574 // BID: 72688 // JVNDB: JVNDB-2015-001573 // CNNVD: CNNVD-201502-398 // NVD: CVE-2015-0628

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0628

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0628

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0628

Trust: 0.8

url:http://www.securityfocus.com/bid/72688

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-01214 // VULHUB: VHN-78574 // BID: 72688 // JVNDB: JVNDB-2015-001573 // CNNVD: CNNVD-201502-398 // NVD: CVE-2015-0628

CREDITS

Cisco

Trust: 0.3

sources: BID: 72688

SOURCES

db:CNVDid:CNVD-2015-01214
db:VULHUBid:VHN-78574
db:BIDid:72688
db:JVNDBid:JVNDB-2015-001573
db:CNNVDid:CNNVD-201502-398
db:NVDid:CVE-2015-0628

LAST UPDATE DATE

2024-11-23T22:01:53.113000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01214date:2015-02-27T00:00:00
db:VULHUBid:VHN-78574date:2015-02-20T00:00:00
db:BIDid:72688date:2015-02-19T00:00:00
db:JVNDBid:JVNDB-2015-001573date:2015-02-24T00:00:00
db:CNNVDid:CNNVD-201502-398date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0628date:2024-11-21T02:23:26.097

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-01214date:2015-02-27T00:00:00
db:VULHUBid:VHN-78574date:2015-02-20T00:00:00
db:BIDid:72688date:2015-02-19T00:00:00
db:JVNDBid:JVNDB-2015-001573date:2015-02-24T00:00:00
db:CNNVDid:CNNVD-201502-398date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0628date:2015-02-20T02:59:01.723