gsd-2023-20179
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-20179",
    "id": "GSD-2023-20179"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-20179"
      ],
      "details": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.\r\n\r This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.",
      "id": "GSD-2023-20179",
      "modified": "2023-12-13T01:20:29.446559Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "psirt@cisco.com",
        "ID": "CVE-2023-20179",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Cisco SD-WAN vManage",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "20.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.4.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.4.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.6"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.7"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.7.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.4.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.5.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.3.7.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.1.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.2.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.4.2.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.5.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.5.1.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.5.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.2.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.1.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.4.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.4.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.0.45"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.0.46"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.0.47"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.3.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.4.0.21"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.1.10"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.1.7"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.1.9"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.2.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.6.5.5"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.7.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.7.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.7.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.8.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.2.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.2.3"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.0.12"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.0.16"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.0.17"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.0.18"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.3.2_LI_Images"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.9.4"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.10.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.10.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.10.1.2"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.11.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.11.1.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "20.11.1.2"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Cisco"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.\r\n\r This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application."
          }
        ]
      },
      "exploit": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-80",
                "lang": "eng",
                "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x",
            "refsource": "MISC",
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x"
          }
        ]
      },
      "source": {
        "advisory": "cisco-sa-vmanage-html-3ZKh8d6x",
        "defects": [
          "CSCwe44307"
        ],
        "discovery": "EXTERNAL"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "24F12886-47A6-42A3-8408-5F0CEC98ECB0",
                    "versionEndExcluding": "20.6.6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1DE03263-AA9C-4717-AF0B-33A5852623FE",
                    "versionEndExcluding": "20.10",
                    "versionStartIncluding": "20.7",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.\r\n\r This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application."
          },
          {
            "lang": "es",
            "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de Cisco Catalyst SD-WAN Manager, anteriormente Cisco SD-WAN vManage, podr\u00eda permitir que un atacante remoto autenticado inyecte contenido HTML. Esta vulnerabilidad se debe a una validaci\u00f3n inadecuada de los datos proporcionados por el usuario en los campos de elementos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando contenido malicioso dentro de las solicitudes y persuadiendo a un usuario para que vea una p\u00e1gina que contenga contenido inyectado. Un exploit exitoso podr\u00eda permitir al atacante modificar p\u00e1ginas dentro de la interfaz de administraci\u00f3n basada en web, lo que posiblemente generar\u00eda m\u00e1s ataques basados en el navegador contra los usuarios de la aplicaci\u00f3n."
          }
        ],
        "id": "CVE-2023-20179",
        "lastModified": "2024-01-25T17:15:32.757",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 5.4,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "LOW",
                "integrityImpact": "LOW",
                "privilegesRequired": "LOW",
                "scope": "CHANGED",
                "userInteraction": "REQUIRED",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 2.3,
              "impactScore": 2.7,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 4.3,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "NONE",
                "integrityImpact": "LOW",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 2.8,
              "impactScore": 1.4,
              "source": "ykramarz@cisco.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2023-09-27T18:15:10.987",
        "references": [
          {
            "source": "ykramarz@cisco.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x"
          }
        ],
        "sourceIdentifier": "ykramarz@cisco.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-79"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-80"
              }
            ],
            "source": "ykramarz@cisco.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.