CWE
113
Advisory Published

cisco-sa-20200122-wsa-sma-header-inject: Cisco Web Security Appliance and Cisco Content Security Management Appliance HTTP Header Injection Vulnerability

First published: Wed Jan 22 2020(Updated: )

A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject

Affected SoftwareAffected VersionHow to fix
Cisco Web Security Appliance
Cisco Content Security Management Virtual Appliance

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-20200122-wsa-sma-header-inject?

    The cisco-sa-20200122-wsa-sma-header-inject vulnerability has a severity rating of high due to the potential for unauthorized header injection.

  • How do I fix cisco-sa-20200122-wsa-sma-header-inject?

    To fix the cisco-sa-20200122-wsa-sma-header-inject vulnerability, you should apply the latest patches or updates provided by Cisco for affected products.

  • Who is affected by cisco-sa-20200122-wsa-sma-header-inject?

    The cisco-sa-20200122-wsa-sma-header-inject vulnerability affects users of Cisco Web Security Appliance and Cisco Content Security Management Appliance.

  • What are the potential impacts of cisco-sa-20200122-wsa-sma-header-inject?

    Exploitation of cisco-sa-20200122-wsa-sma-header-inject can allow an attacker to inject malicious HTTP headers, potentially leading to various attacks such as Cross-Site Scripting (XSS).

  • Is authentication required to exploit cisco-sa-20200122-wsa-sma-header-inject?

    No, the cisco-sa-20200122-wsa-sma-header-inject vulnerability can be exploited by unauthenticated remote attackers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203