First published: Thu Sep 02 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Collaboration Provisioning | <=12.6_su3\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34732 is a vulnerability in the web-based management interface of Cisco Prime Collaboration Provisioning that allows an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
An attacker can exploit CVE-2021-34732 by sending malicious code to a user of the web-based management interface, which gets executed in the user's browser.
CVE-2021-34732 has a severity rating of medium (6.1).
To mitigate CVE-2021-34732, Cisco recommends applying the necessary updates or patches provided by the vendor.
You can find more information about CVE-2021-34732 on the Cisco Security Advisory website at: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-collab-xss-fQMDE5GO.