First published: Fri Jun 05 2009(Updated: )
Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | =6.0.0-754 | |
Cisco AsyncOS | =6.0.0-757 | |
Cisco AsyncOS | =6.1.0-301 | |
Cisco AsyncOS | =6.1.0-304 | |
Cisco AsyncOS | =6.1.0-306 | |
Cisco AsyncOS | =6.1.0-307 | |
Cisco AsyncOS | =6.1.5-110 | |
Cisco AsyncOS | =6.1.6-003 | |
Cisco AsyncOS | =6.3.5-003 | |
Cisco AsyncOS | =6.3.6-003 | |
Cisco AsyncOS | =6.5.0-405 | |
Cisco AsyncOS | =6.5.1-005 | |
Cisco AsyncOS | =6.6.4.0-273 | |
Cisco Email Security Appliance | =c | |
Cisco Email Security Appliance | =m | |
Cisco Email Security Appliance | =x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1162 is classified as a medium severity vulnerability.
To fix CVE-2009-1162, upgrade to Cisco IronPort AsyncOS version 6.5.2 or later.
CVE-2009-1162 affects various versions of Cisco IronPort AsyncOS prior to 6.5.2 on Series C, M, and X appliances.
CVE-2009-1162 can be exploited for cross-site scripting (XSS) attacks via the referrer parameter.
Implementing input validation on the referrer parameter can help mitigate the risk of CVE-2009-1162.