First published: Wed Jan 22 2020(Updated: )
A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Appliance | ||
Cisco Content Security Management Virtual Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20200122-wsa-sma-header-inject vulnerability has a severity rating of high due to the potential for unauthorized header injection.
To fix the cisco-sa-20200122-wsa-sma-header-inject vulnerability, you should apply the latest patches or updates provided by Cisco for affected products.
The cisco-sa-20200122-wsa-sma-header-inject vulnerability affects users of Cisco Web Security Appliance and Cisco Content Security Management Appliance.
Exploitation of cisco-sa-20200122-wsa-sma-header-inject can allow an attacker to inject malicious HTTP headers, potentially leading to various attacks such as Cross-Site Scripting (XSS).
No, the cisco-sa-20200122-wsa-sma-header-inject vulnerability can be exploited by unauthenticated remote attackers.