First published: Thu Feb 22 2018(Updated: )
A vulnerability in the web-based interface of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface of an affected product. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvh65713.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Service Catalog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0200 is a vulnerability in the web-based interface of Cisco Prime Service Catalog that allows an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack.
CVE-2018-0200 has a severity rating of 6.1, which is considered medium.
CVE-2018-0200 affects the web-based interface of Cisco Prime Service Catalog by enabling an unauthenticated attacker to conduct a reflected cross-site scripting attack.
Yes, there are references available for CVE-2018-0200. They include: [securityfocus.com](http://www.securityfocus.com/bid/103128), [securitytracker.com](http://www.securitytracker.com/id/1040408), and [cisco.com](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-psc).
The Common Weakness Enumeration (CWE) for CVE-2018-0200 is CWE-79, which refers to the improper neutralization of input during web page generation.