First published: Tue Jun 10 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the web management interface in Cisco AsyncOS on the Email Security Appliance (ESA) 8.0, Web Security Appliance (WSA) 8.0 (.5 Hot Patch 1) and earlier, and Content Security Management Appliance (SMA) 8.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted parameter, as demonstrated by the date_range parameter to monitor/reports/overview on the IronPort ESA, aka Bug IDs CSCun07998, CSCun07844, and CSCun07888.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | <=8.0 | |
Cisco Web Security Appliance | ||
Cisco AsyncOS | <=8.3 | |
Cisco Content Security Management | ||
Cisco AsyncOS | =8.0 | |
Cisco Email Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3289 is classified as a medium severity vulnerability due to its potential for remote exploitation via cross-site scripting.
To fix CVE-2014-3289, update to the latest version of Cisco AsyncOS that addresses this XSS vulnerability.
CVE-2014-3289 affects Cisco AsyncOS on Email Security Appliance, Web Security Appliance, and Content Security Management Appliance versions prior to the specified updates.
Yes, CVE-2014-3289 can be exploited remotely by attackers injecting malicious scripts through the web management interface.
CVE-2014-3289 is a cross-site scripting (XSS) vulnerability that allows for the injection of arbitrary web scripts.