First published: Thu Apr 18 2019(Updated: )
A vulnerability in the URL block page of Cisco Umbrella could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user in a network protected by Umbrella. The vulnerability is due to insufficient validation of input parameters passed to that page. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. This vulnerability has been fixed in the current version of Cisco Umbrella. Cisco Umbrella is a cloud service.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1792 is a vulnerability in the URL block page of Cisco Umbrella that allows an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack against a user in a network protected by Umbrella.
CVE-2019-1792 affects Cisco Umbrella by allowing unauthenticated remote attackers to conduct XSS attacks on users within a protected network.
CVE-2019-1792 has a severity rating of medium and a CVSS score of 6.1.
To fix CVE-2019-1792, it is recommended to apply the necessary updates or patches provided by Cisco Umbrella.
Yes, you can refer to the following links for more information regarding CVE-2019-1792: [http://www.securityfocus.com/bid/108014](http://www.securityfocus.com/bid/108014) and [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-umbrella-xss](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-umbrella-xss).