CNVD-2021-55181

Vulnerability from cnvd - Published: 2021-07-27
VLAI Severity ?
Title
Avaya Aura Experience Portal跨站脚本漏洞
Description
Avaya Aura Experience Portal是美国Avaya公司的新一代的 Avaya Voice Portal。为组织提供所有自动化语音和多媒体应用程序和服务的单点编排。Experience Portal 支持 SIP、IP、TDM 或混合环境。它包括强大的管理、报告、开发和虚拟化功能,可帮助组织降低成本并简化运营。 Avaya Aura Experience Portal Web存在安全漏洞,攻击者可利用该漏洞允许经过身份验证的用户泄露敏感信息。
Severity
Patch Name
Avaya Aura Experience Portal跨站脚本漏洞的补丁
Patch Description
Avaya Aura Experience Portal是美国Avaya公司的新一代的 Avaya Voice Portal。为组织提供所有自动化语音和多媒体应用程序和服务的单点编排。Experience Portal 支持 SIP、IP、TDM 或混合环境。它包括强大的管理、报告、开发和虚拟化功能,可帮助组织降低成本并简化运营。 Avaya Aura Experience Portal Web存在安全漏洞,攻击者可利用该漏洞允许经过身份验证的用户泄露敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.avaya.com/css/P8/documents/101076479

Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-25656
Impacted products
Name
['Avaya Aura Experience Portal >=7.0,<=7.2.3', 'Avaya Aura Experience Portal 8.0.0']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-25656"
    }
  },
  "description": "Avaya Aura Experience Portal\u662f\u7f8e\u56fdAvaya\u516c\u53f8\u7684\u65b0\u4e00\u4ee3\u7684 Avaya Voice Portal\u3002\u4e3a\u7ec4\u7ec7\u63d0\u4f9b\u6240\u6709\u81ea\u52a8\u5316\u8bed\u97f3\u548c\u591a\u5a92\u4f53\u5e94\u7528\u7a0b\u5e8f\u548c\u670d\u52a1\u7684\u5355\u70b9\u7f16\u6392\u3002Experience Portal \u652f\u6301 SIP\u3001IP\u3001TDM \u6216\u6df7\u5408\u73af\u5883\u3002\u5b83\u5305\u62ec\u5f3a\u5927\u7684\u7ba1\u7406\u3001\u62a5\u544a\u3001\u5f00\u53d1\u548c\u865a\u62df\u5316\u529f\u80fd\uff0c\u53ef\u5e2e\u52a9\u7ec4\u7ec7\u964d\u4f4e\u6210\u672c\u5e76\u7b80\u5316\u8fd0\u8425\u3002\n\nAvaya Aura Experience Portal Web\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5141\u8bb8\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u7528\u6237\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.avaya.com/css/P8/documents/101076479",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-55181",
  "openTime": "2021-07-27",
  "patchDescription": "Avaya Aura Experience Portal\u662f\u7f8e\u56fdAvaya\u516c\u53f8\u7684\u65b0\u4e00\u4ee3\u7684 Avaya Voice Portal\u3002\u4e3a\u7ec4\u7ec7\u63d0\u4f9b\u6240\u6709\u81ea\u52a8\u5316\u8bed\u97f3\u548c\u591a\u5a92\u4f53\u5e94\u7528\u7a0b\u5e8f\u548c\u670d\u52a1\u7684\u5355\u70b9\u7f16\u6392\u3002Experience Portal \u652f\u6301 SIP\u3001IP\u3001TDM \u6216\u6df7\u5408\u73af\u5883\u3002\u5b83\u5305\u62ec\u5f3a\u5927\u7684\u7ba1\u7406\u3001\u62a5\u544a\u3001\u5f00\u53d1\u548c\u865a\u62df\u5316\u529f\u80fd\uff0c\u53ef\u5e2e\u52a9\u7ec4\u7ec7\u964d\u4f4e\u6210\u672c\u5e76\u7b80\u5316\u8fd0\u8425\u3002\r\n\r\nAvaya Aura Experience Portal Web\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5141\u8bb8\u7ecf\u8fc7\u8eab\u4efd\u9a8c\u8bc1\u7684\u7528\u6237\u6cc4\u9732\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Avaya Aura Experience Portal\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Avaya Aura Experience Portal \u003e=7.0\uff0c\u003c=7.2.3",
      "Avaya Aura Experience Portal 8.0.0"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-25656",
  "serverity": "\u4f4e",
  "submitTime": "2021-06-25",
  "title": "Avaya Aura Experience Portal\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…