Информационная безопасность
[RU] switch to English

Дополнительная информация

  Межсайтовый скриптинг в Cisco Wireless Control System

  Cisco Security Advisory: SQL Injection Vulnerability in Cisco Wireless Control System

From:Tom Neaves <tom_(at)_tomneaves.com>
Date:9 августа 2010 г.
Subject:Cisco Wireless Control System XSS

Product Name: Cisco Wireless Control System
Vendor: http://www.cisco.com
Date: 4 August, 2010
Author: [email protected] <[email protected]>
Original URL: http://www.tomneaves.com/Cisco_Wireless_Control_System_XSS.txt
Discovered: 8 July, 2010
Disclosed: 4 August, 2010


The Cisco Wireless Control System (WCS) is a web interface that allows centralised management
and reporting within a Cisco wireless infrastructure.


A Cross-site Scripting (XSS) vulnerability exists within the search function on the
Cisco Wireless Control System (WCS) web interface due to insufficient input validation.
This enables attackers to prepare links for a website that includes code that is executed
by the browser visiting this website.


The affected script is "/webacs/QuickSearchAction.do", namely the "searchText" parameter.
Although not tested due to limitations, it is likely that all other parameters related to
this script will also be affected by this issue.

Affected Versions: All versions of Cisco WCS up to and including  Some versions of
7.0 *may* be affected.  Interim versions 7.0(118.0) and 6.0(194.0) are not vulnerable.


8 July, 2010 - Contacted vendor.
8 July, 2010 - Vendor acknowledged and confirmed vulnerability - will include in maintenance patch.
4 August, 2010 - Vendor releases maintenance patch (Cisco Bug ID = CSCtf14288).
4 August, 2010 - Vulnerability publicly disclosed.


Discovered by Tom Neaves (Verizon Business)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород