var-201501-0215
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113. Vendors have confirmed this vulnerability Bug ID CSCus22925 and CSCup08113 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. Cisco AsyncOS is Cisco's custom operating system for the performance and security of all messaging applications. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug IDs CSCus22925 and CSCup08113. Cisco AsyncOS is an operating system used in these products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asyncos", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "asyncos", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asyncos software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "email security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "content security management appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:asyncos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0577" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "72056" } ], "trust": 0.3 }, "cve": "CVE-2015-0577", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0577", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-00429", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-78523", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0577", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-00429", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201501-303", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78523", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in the IronPort Spam Quarantine (ISQ) page in Cisco AsyncOS, as used on the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA), allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCus22925 and CSCup08113. Vendors have confirmed this vulnerability Bug ID CSCus22925 and CSCup08113 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. Cisco AsyncOS is Cisco\u0027s custom operating system for the performance and security of all messaging applications. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCus22925 and CSCup08113. Cisco AsyncOS is an operating system used in these products", "sources": [ { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "BID", "id": "72056" }, { "db": "VULHUB", "id": "VHN-78523" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0577", "trust": 3.4 }, { "db": "BID", "id": "72056", "trust": 2.0 }, { "db": "SECUNIA", "id": "62289", "trust": 1.1 }, { "db": "SECTRACK", "id": "1031544", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-001039", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201501-303", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-00429", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78523", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "id": "VAR-201501-0215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" } ], "trust": 1.28850889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" } ] }, "last_update_date": "2023-12-18T14:06:05.843000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco AsyncOS ISQ XSS Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0577" }, { "title": "Cisco AsyncOS has multiple patches for cross-site scripting vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/54144" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78523" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0577" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/72056" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031544" }, { "trust": 1.1, "url": "http://secunia.com/advisories/62289" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0577" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0577" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/content-security-management-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-00429" }, { "db": "VULHUB", "id": "VHN-78523" }, { "db": "BID", "id": "72056" }, { "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "db": "NVD", "id": "CVE-2015-0577" }, { "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-20T00:00:00", "db": "CNVD", "id": "CNVD-2015-00429" }, { "date": "2015-01-14T00:00:00", "db": "VULHUB", "id": "VHN-78523" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72056" }, { "date": "2015-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "date": "2015-01-14T19:59:01.600000", "db": "NVD", "id": "CVE-2015-0577" }, { "date": "2015-01-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-20T00:00:00", "db": "CNVD", "id": "CNVD-2015-00429" }, { "date": "2017-09-08T00:00:00", "db": "VULHUB", "id": "VHN-78523" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72056" }, { "date": "2015-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001039" }, { "date": "2017-09-08T01:29:44.873000", "db": "NVD", "id": "CVE-2015-0577" }, { "date": "2015-01-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-303" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201501-303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco E Email Security Appliance and content Used by Security Management appliance AsyncOS Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001039" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201501-303" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.