Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Cisco ASA Web VPN
Опубликовано:25 июня 2009 г.
Источник:
SecurityVulns ID:10013
Тип:удаленная
Уровень опасности:
5/10
Описание:Межсайтовый скриптинг, обход фильтрации, утечка информации.
CVE:CVE-2009-1203 (WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 does not properly distinguish its own login screen from the login screens it produces for third-party (1) FTP and (2) CIFS servers, which makes it easier for remote attackers to trick a user into sending WebVPN credentials to an arbitrary server via a URL associated with that server, aka Bug ID CSCsy80709.)
 CVE-2009-1202 (WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 allows remote attackers to bypass certain protection mechanisms involving URL rewriting and HTML rewriting, and conduct cross-site scripting (XSS) attacks, by modifying the first hex-encoded character in a /+CSCO+ URI, aka Bug ID CSCsy80705.)
 CVE-2009-1201 (Eval injection vulnerability in the csco_wrap_js function in /+CSCOL+/cte.js in WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 allows remote attackers to bypass a DOM wrapper and conduct cross-site scripting (XSS) attacks by setting CSCO_WebVPN['process'] to the name of a crafted function, aka Bug ID CSCsy80694.)
Оригинальный текстdocumentTrustwave Advisories, Trustwave's SpiderLabs Security Advisory TWSL2009-002 (25.06.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород