Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-20120 (GCVE-0-2023-20120)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Web Security Appliance (WSA) |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20120", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:33:55.738739Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:56:47.035Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Web Security Appliance (WSA) ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-28T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-cP9DuEmq", "defect": [ [ "CSCwd50087", "CSCwd50094", "CSCwe12624", "CSCwe14247", "CSCwe14250", "CSCwe18586" ] ], "discovery": "INTERNAL" }, "title": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20120", "datePublished": "2023-06-28T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:56:47.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-20120\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-06-28T15:15:09.760\",\"lastModified\":\"2024-11-21T07:40:36.147\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.0-418:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91A23056-1521-4982-8F4D-BCDB6F9E98EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-033:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9897B99-0295-4D4D-8EE7-88FB5BC97123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-053:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286B37A2-A7B1-44D9-A2BD-56F9C26195A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-050:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3774F588-98E5-4197-B858-FF83B5838265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-256:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99A048C2-7352-4ED5-990F-95467AAB022C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway:14.0.0-418:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02212FE3-CEE6-4609-B9AE-CD228F4ADFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway:14.0.1-033:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0DB52EF-1542-4665-AC44-F1E3B074B615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway:14.0.1-053:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615DD221-9200-41D1-9DAF-CC8BEB67342C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway:15.0.0-050:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AEA665F-86B3-4AA6-9E99-6F935264222A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:secure_email_gateway:15.0.0-256:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988AAD9A-B4FD-42C5-B222-53A4E69CE87E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:14.0.0-418:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A694B4F-D454-405B-B620-A899543DA2E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:14.0.1-033:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB812B1F-3E7E-4AD6-9AA3-241B957A0047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:14.0.1-053:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE6AB7B-561D-4D50-907B-605CD0649A98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:15.0.0-050:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71B523B-95F6-463F-B96B-9C301B6FFA9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:web_security_appliance:15.0.0-256:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DFDA027-9BED-4DB5-804D-A192FF8138CF\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq\", \"name\": \"20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T08:57:35.927Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20120\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-25T14:33:55.738739Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-25T14:39:40.769Z\"}}], \"cna\": {\"title\": \"Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities\", \"source\": {\"defect\": [[\"CSCwd50087\", \"CSCwd50094\", \"CSCwe12624\", \"CSCwe14247\", \"CSCwe14250\", \"CSCwe18586\"]], \"advisory\": \"cisco-sa-esa-sma-wsa-xss-cP9DuEmq\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Web Security Appliance (WSA) \", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory. \"}], \"datePublic\": \"2023-06-21T00:00:00\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq\", \"name\": \"20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2023-06-28T00:00:00\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-20120\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-25T15:56:47.035Z\", \"dateReserved\": \"2022-10-27T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2023-06-28T00:00:00\", \"assignerShortName\": \"cisco\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2023-1534
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Cisco Email Security Appliance ist eine E-Mail-Sicherheitsl\u00f6sung.\r\nDie Cisco Web Security Appliance sch\u00fctzt den Netzwerk-Perimeter vor Spyware und einer Vielzahl von webbasierten Bedrohungen. Sie kombiniert mehrere Sicherheitstechnologien wie beispielsweise eine tiefgreifende \u00dcberpr\u00fcfung der Anwendungsinhalte.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Cisco Email Security Appliance und Cisco Web Security Appliance ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1534 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1534.json" }, { "category": "self", "summary": "WID-SEC-2023-1534 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1534" }, { "category": "external", "summary": "Cisco Security Advisory vom 2023-06-21", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "source_lang": "en-US", "title": "Cisco Email Security Appliance: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting", "tracking": { "current_release_date": "2023-06-21T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:54.751+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1534", "initial_release_date": "2023-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco Email Security Appliance \u003c 15.0.0-317", "product": { "name": "Cisco Email Security Appliance \u003c 15.0.0-317", "product_id": "T028272", "product_identification_helper": { "cpe": "cpe:/h:cisco:email_security_appliance:15.0.0-317" } } }, { "category": "product_name", "name": "Cisco Email Security Appliance \u003c 15.0.0-068", "product": { "name": "Cisco Email Security Appliance \u003c 15.0.0-068", "product_id": "T028274", "product_identification_helper": { "cpe": "cpe:/h:cisco:email_security_appliance:15.0.0-068" } } } ], "category": "product_name", "name": "Email Security Appliance" }, { "branches": [ { "category": "product_name", "name": "Cisco Web Security Appliance \u003c 15.0.0-317", "product": { "name": "Cisco Web Security Appliance \u003c 15.0.0-317", "product_id": "T028276", "product_identification_helper": { "cpe": "cpe:/a:cisco:web_security_appliance:15.0.0-317" } } }, { "category": "product_name", "name": "Cisco Web Security Appliance \u003c 15.0.0-332", "product": { "name": "Cisco Web Security Appliance \u003c 15.0.0-332", "product_id": "T028277", "product_identification_helper": { "cpe": "cpe:/a:cisco:web_security_appliance:15.0.0-332" } } } ], "category": "product_name", "name": "Web Security Appliance" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20120", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20120" }, { "cve": "CVE-2023-20119", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20119" }, { "cve": "CVE-2023-20028", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20028" } ] }
WID-SEC-W-2023-1534
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Cisco Email Security Appliance ist eine E-Mail-Sicherheitsl\u00f6sung.\r\nDie Cisco Web Security Appliance sch\u00fctzt den Netzwerk-Perimeter vor Spyware und einer Vielzahl von webbasierten Bedrohungen. Sie kombiniert mehrere Sicherheitstechnologien wie beispielsweise eine tiefgreifende \u00dcberpr\u00fcfung der Anwendungsinhalte.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Cisco Email Security Appliance und Cisco Web Security Appliance ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1534 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1534.json" }, { "category": "self", "summary": "WID-SEC-2023-1534 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1534" }, { "category": "external", "summary": "Cisco Security Advisory vom 2023-06-21", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "source_lang": "en-US", "title": "Cisco Email Security Appliance: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting", "tracking": { "current_release_date": "2023-06-21T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:54.751+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1534", "initial_release_date": "2023-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco Email Security Appliance \u003c 15.0.0-317", "product": { "name": "Cisco Email Security Appliance \u003c 15.0.0-317", "product_id": "T028272", "product_identification_helper": { "cpe": "cpe:/h:cisco:email_security_appliance:15.0.0-317" } } }, { "category": "product_name", "name": "Cisco Email Security Appliance \u003c 15.0.0-068", "product": { "name": "Cisco Email Security Appliance \u003c 15.0.0-068", "product_id": "T028274", "product_identification_helper": { "cpe": "cpe:/h:cisco:email_security_appliance:15.0.0-068" } } } ], "category": "product_name", "name": "Email Security Appliance" }, { "branches": [ { "category": "product_name", "name": "Cisco Web Security Appliance \u003c 15.0.0-317", "product": { "name": "Cisco Web Security Appliance \u003c 15.0.0-317", "product_id": "T028276", "product_identification_helper": { "cpe": "cpe:/a:cisco:web_security_appliance:15.0.0-317" } } }, { "category": "product_name", "name": "Cisco Web Security Appliance \u003c 15.0.0-332", "product": { "name": "Cisco Web Security Appliance \u003c 15.0.0-332", "product_id": "T028277", "product_identification_helper": { "cpe": "cpe:/a:cisco:web_security_appliance:15.0.0-332" } } } ], "category": "product_name", "name": "Web Security Appliance" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20120", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20120" }, { "cve": "CVE-2023-20119", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20119" }, { "cve": "CVE-2023-20028", "notes": [ { "category": "description", "text": "In Cisco Email Security Appliance und Cisco Web Security Appliance wurden mehrere Cross-Site-Scripting-Schwachstellen entdeckt. Diese Probleme werden durch eine unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der webbasierten Verwaltungsoberfl\u00e4che verursacht, bevor die Eingaben angezeigt werden. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Die erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion und in einem Fall erh\u00f6hte Rechte." } ], "release_date": "2023-06-21T22:00:00.000+00:00", "title": "CVE-2023-20028" } ] }
gsd-2023-20120
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-20120", "id": "GSD-2023-20120" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20120" ], "details": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.", "id": "GSD-2023-20120", "modified": "2023-12-13T01:20:29.365011Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2023-06-21T16:00:00", "ID": "CVE-2023-20120", "STATE": "PUBLIC", "TITLE": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Web Security Appliance (WSA) ", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "eng", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory. " } ], "impact": { "cvss": { "baseScore": "6.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N ", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "refsource": "CISCO", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ] }, "source": { "advisory": "cisco-sa-esa-sma-wsa-xss-cP9DuEmq", "defect": [ [ "CSCwd50087", "CSCwd50094", "CSCwe12624", "CSCwe14247", "CSCwe14250", "CSCwe18586" ] ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_gateway:14.0.1-053:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:14.0.1-053:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-053:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-256:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_gateway:15.0.0-256:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:15.0.0-256:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_gateway:14.0.1-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:14.0.1-033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.0-418:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_gateway:14.0.0-418:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:14.0.0-418:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-050:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_email_gateway:15.0.0-050:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:web_security_appliance:15.0.0-050:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20120" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20230621 Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "refsource": "CISCO", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-07-07T16:02Z", "publishedDate": "2023-06-28T15:15Z" } } }
fkie_cve-2023-20120
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vendor | Product | Version | |
---|---|---|---|
cisco | secure_email_and_web_manager | 14.0.0-418 | |
cisco | secure_email_and_web_manager | 14.0.1-033 | |
cisco | secure_email_and_web_manager | 14.0.1-053 | |
cisco | secure_email_and_web_manager | 15.0.0-050 | |
cisco | secure_email_and_web_manager | 15.0.0-256 | |
cisco | secure_email_gateway | 14.0.0-418 | |
cisco | secure_email_gateway | 14.0.1-033 | |
cisco | secure_email_gateway | 14.0.1-053 | |
cisco | secure_email_gateway | 15.0.0-050 | |
cisco | secure_email_gateway | 15.0.0-256 | |
cisco | web_security_appliance | 14.0.0-418 | |
cisco | web_security_appliance | 14.0.1-033 | |
cisco | web_security_appliance | 14.0.1-053 | |
cisco | web_security_appliance | 15.0.0-050 | |
cisco | web_security_appliance | 15.0.0-256 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "91A23056-1521-4982-8F4D-BCDB6F9E98EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-033:*:*:*:*:*:*:*", "matchCriteriaId": "D9897B99-0295-4D4D-8EE7-88FB5BC97123", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "286B37A2-A7B1-44D9-A2BD-56F9C26195A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-050:*:*:*:*:*:*:*", "matchCriteriaId": "3774F588-98E5-4197-B858-FF83B5838265", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_and_web_manager:15.0.0-256:*:*:*:*:*:*:*", "matchCriteriaId": "99A048C2-7352-4ED5-990F-95467AAB022C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway:14.0.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "02212FE3-CEE6-4609-B9AE-CD228F4ADFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway:14.0.1-033:*:*:*:*:*:*:*", "matchCriteriaId": "B0DB52EF-1542-4665-AC44-F1E3B074B615", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "615DD221-9200-41D1-9DAF-CC8BEB67342C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway:15.0.0-050:*:*:*:*:*:*:*", "matchCriteriaId": "4AEA665F-86B3-4AA6-9E99-6F935264222A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:secure_email_gateway:15.0.0-256:*:*:*:*:*:*:*", "matchCriteriaId": "988AAD9A-B4FD-42C5-B222-53A4E69CE87E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:14.0.0-418:*:*:*:*:*:*:*", "matchCriteriaId": "5A694B4F-D454-405B-B620-A899543DA2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:14.0.1-033:*:*:*:*:*:*:*", "matchCriteriaId": "CB812B1F-3E7E-4AD6-9AA3-241B957A0047", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:14.0.1-053:*:*:*:*:*:*:*", "matchCriteriaId": "BDE6AB7B-561D-4D50-907B-605CD0649A98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:15.0.0-050:*:*:*:*:*:*:*", "matchCriteriaId": "B71B523B-95F6-463F-B96B-9C301B6FFA9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:15.0.0-256:*:*:*:*:*:*:*", "matchCriteriaId": "1DFDA027-9BED-4DB5-804D-A192FF8138CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory." } ], "id": "CVE-2023-20120", "lastModified": "2024-11-21T07:40:36.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-28T15:15:09.760", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cisco-sa-esa-sma-wsa-xss-cp9duemq
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "CVE-2023-20028 was found by Roberto Petrillo of Cisco during internal security testing.\r\n\r\nCVE-2023-20119 and CVE-2023-20120 were found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n\r\n\r\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure [\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"].", "title": "Summary" }, { "category": "general", "text": "At the time of publication, CVE-2023-20028 affected the following Cisco products:\r\n\r\nSecure Email and Web Manager, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances\r\n\r\nAt the time of publication, CVE-2023-20119 affected Cisco Secure Email and Web Manager, both virtual and hardware appliances.\r\n\r\nAt the time of publication, CVE-2023-20120 affected the following Cisco products:\r\n\r\nSecure Email and Web Manager, both virtual and hardware appliances\r\nSecure Email Gateway, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that CVE-2023-20028 does not affect Cisco Secure Email Gateway, both virtual and hardware appliances.\r\n\r\nCisco has confirmed that CVE-2023-20119 does not affect the following Cisco products:\r\n\r\nSecure Email Gateway, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nDetails about the vulnerabilities are as follows:\r\n\r\nCVE-2023-20119: Cisco Secure Email and Web Manager Reflected XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwe12624 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe12624\"]\r\nCVE ID: CVE-2023-20119\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.1\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\r\n\r\nCVE-2023-20120: Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance Stored XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwe14247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14247\"], CSCwe14250 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14250\"], CSCwe18586 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe18586\"]\r\nCVE ID: CVE-2023-20120\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.4\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\r\n\r\nCVE-2023-20028: Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwd50087 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50087\"], CSCwd50094 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50094\"]\r\nCVE ID: CVE-2023-20028\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following tables was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerabilities that are described in this advisory and which release included the fix for these vulnerabilities.\r\n\r\nSecure Email and Web Manager\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20028, CVE-2023-20119, and CVE-2023-20120 14.3 and earlier Migrate to a fixed release. 15.0 15.0.01 (Jul 2023)\r\nSecure Email Gateway\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20120 14.3 and earlier2 Migrate to a fixed release. 15.0 15.0.01 (Jul 2023)\r\nSecure Web Appliance\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20028 and CVE-2023-20120 14.5 and earlier Migrate to a fixed release. 15.0 15.0.0-3321\r\n1. This release is a Limited Deployment (LD) release. Customers who wish to upgrade to this release can contact Cisco TAC to provision this release to their appliances. The General Deployment (GD) release is currently under review and will be available in the future.\r\n2. For customers using Cisco Secure Email Cloud Gateway, no action is required. Cisco has taken actions to protect the infrastructure from this vulnerability, and upgrades to fixed releases will be deployed as part of the standard upgrade processes for the environment.\r\nIn most cases, the software can be upgraded over the network by using the System Upgrade options in the web interface of the appliance. To upgrade a device by using the web interface, do the following:\r\n\r\nChoose System Administration \u003e System Upgrade.\r\nClick Upgrade Options.\r\nChoose Download and Install.\r\nChoose the release to upgrade to.\r\nIn the Upgrade Preparation area, choose the appropriate options.\r\nClick Proceed to begin the upgrade. A progress bar displays the status of the upgrade.\r\n\r\nAfter the upgrade is complete, the device reboots.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "CVE-2023-20028 was found by Roberto Petrillo of Cisco during internal security testing.\r\n\r\nCVE-2023-20119 and CVE-2023-20120 were found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "Meet Cisco Secure", "url": "https://www.cisco.com/c/en/us/products/security/secure-names.html" }, { "category": "external", "summary": "CSCwe12624", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe12624" }, { "category": "external", "summary": "CSCwe14247", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14247" }, { "category": "external", "summary": "CSCwe14250", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14250" }, { "category": "external", "summary": "CSCwe18586", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe18586" }, { "category": "external", "summary": "CSCwd50087", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50087" }, { "category": "external", "summary": "CSCwd50094", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50094" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "tracking": { "current_release_date": "2023-07-11T16:43:10+00:00", "generator": { "date": "2024-05-10T23:24:50+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-esa-sma-wsa-xss-cP9DuEmq", "initial_release_date": "2023-06-21T16:00:00+00:00", "revision_history": [ { "date": "2023-06-21T16:03:35+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2023-06-26T19:12:02+00:00", "number": "1.1.0", "summary": "Updated the fixed releases for Secure Email and Web Manager and Secure Email Gateway." }, { "date": "2023-07-11T16:43:10+00:00", "number": "1.2.0", "summary": "Updated the fixed releases information for Cisco Secure Email Cloud Gateway." } ], "status": "final", "version": "1.2.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Secure Web Appliance", "product": { "name": "Cisco Secure Web Appliance ", "product_id": "CSAFPID-189789" } }, { "category": "product_family", "name": "Cisco Secure Email", "product": { "name": "Cisco Secure Email ", "product_id": "CSAFPID-189790" } }, { "category": "product_family", "name": "Cisco Secure Email and Web Manager", "product": { "name": "Cisco Secure Email and Web Manager ", "product_id": "CSAFPID-189791" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20120", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwe14247" }, { "system_name": "Cisco Bug ID", "text": "CSCwe18586" }, { "system_name": "Cisco Bug ID", "text": "CSCwe14250" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189791", "CSAFPID-189789", "CSAFPID-189790" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791", "CSAFPID-189790", "CSAFPID-189789" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189791", "CSAFPID-189789", "CSAFPID-189790" ] } ], "title": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored Cross-Site Scripting Vulnerability" }, { "cve": "CVE-2023-20028", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwd50087" }, { "system_name": "Cisco Bug ID", "text": "CSCwd50094" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189789", "CSAFPID-189791" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791", "CSAFPID-189789" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189789", "CSAFPID-189791" ] } ], "title": "Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored Cross-Site Scripting Vulnerability" }, { "cve": "CVE-2023-20119", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwe12624" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189791" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189791" ] } ], "title": "Cisco Secure Email and Web Manager Reflected Cross-Site Scripting Vulnerability" } ] }
cisco-sa-esa-sma-wsa-xss-cP9DuEmq
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "CVE-2023-20028 was found by Roberto Petrillo of Cisco during internal security testing.\r\n\r\nCVE-2023-20119 and CVE-2023-20120 were found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n\r\n\r\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see Meet Cisco Secure [\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"].", "title": "Summary" }, { "category": "general", "text": "At the time of publication, CVE-2023-20028 affected the following Cisco products:\r\n\r\nSecure Email and Web Manager, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances\r\n\r\nAt the time of publication, CVE-2023-20119 affected Cisco Secure Email and Web Manager, both virtual and hardware appliances.\r\n\r\nAt the time of publication, CVE-2023-20120 affected the following Cisco products:\r\n\r\nSecure Email and Web Manager, both virtual and hardware appliances\r\nSecure Email Gateway, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that CVE-2023-20028 does not affect Cisco Secure Email Gateway, both virtual and hardware appliances.\r\n\r\nCisco has confirmed that CVE-2023-20119 does not affect the following Cisco products:\r\n\r\nSecure Email Gateway, both virtual and hardware appliances\r\nSecure Web Appliance, both virtual and hardware appliances", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nDetails about the vulnerabilities are as follows:\r\n\r\nCVE-2023-20119: Cisco Secure Email and Web Manager Reflected XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwe12624 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe12624\"]\r\nCVE ID: CVE-2023-20119\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.1\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\r\n\r\nCVE-2023-20120: Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance Stored XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwe14247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14247\"], CSCwe14250 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14250\"], CSCwe18586 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe18586\"]\r\nCVE ID: CVE-2023-20120\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.4\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\r\n\r\nCVE-2023-20028: Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored XSS Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwd50087 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50087\"], CSCwd50094 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50094\"]\r\nCVE ID: CVE-2023-20028\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following tables was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerabilities that are described in this advisory and which release included the fix for these vulnerabilities.\r\n\r\nSecure Email and Web Manager\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20028, CVE-2023-20119, and CVE-2023-20120 14.3 and earlier Migrate to a fixed release. 15.0 15.0.01 (Jul 2023)\r\nSecure Email Gateway\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20120 14.3 and earlier2 Migrate to a fixed release. 15.0 15.0.01 (Jul 2023)\r\nSecure Web Appliance\r\n Cisco AsyncOS Release First Fixed Release for CVE-2023-20028 and CVE-2023-20120 14.5 and earlier Migrate to a fixed release. 15.0 15.0.0-3321\r\n1. This release is a Limited Deployment (LD) release. Customers who wish to upgrade to this release can contact Cisco TAC to provision this release to their appliances. The General Deployment (GD) release is currently under review and will be available in the future.\r\n2. For customers using Cisco Secure Email Cloud Gateway, no action is required. Cisco has taken actions to protect the infrastructure from this vulnerability, and upgrades to fixed releases will be deployed as part of the standard upgrade processes for the environment.\r\nIn most cases, the software can be upgraded over the network by using the System Upgrade options in the web interface of the appliance. To upgrade a device by using the web interface, do the following:\r\n\r\nChoose System Administration \u003e System Upgrade.\r\nClick Upgrade Options.\r\nChoose Download and Install.\r\nChoose the release to upgrade to.\r\nIn the Upgrade Preparation area, choose the appropriate options.\r\nClick Proceed to begin the upgrade. A progress bar displays the status of the upgrade.\r\n\r\nAfter the upgrade is complete, the device reboots.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "CVE-2023-20028 was found by Roberto Petrillo of Cisco during internal security testing.\r\n\r\nCVE-2023-20119 and CVE-2023-20120 were found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "Meet Cisco Secure", "url": "https://www.cisco.com/c/en/us/products/security/secure-names.html" }, { "category": "external", "summary": "CSCwe12624", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe12624" }, { "category": "external", "summary": "CSCwe14247", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14247" }, { "category": "external", "summary": "CSCwe14250", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14250" }, { "category": "external", "summary": "CSCwe18586", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe18586" }, { "category": "external", "summary": "CSCwd50087", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50087" }, { "category": "external", "summary": "CSCwd50094", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd50094" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "tracking": { "current_release_date": "2023-07-11T16:43:10+00:00", "generator": { "date": "2024-05-10T23:24:50+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-esa-sma-wsa-xss-cP9DuEmq", "initial_release_date": "2023-06-21T16:00:00+00:00", "revision_history": [ { "date": "2023-06-21T16:03:35+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2023-06-26T19:12:02+00:00", "number": "1.1.0", "summary": "Updated the fixed releases for Secure Email and Web Manager and Secure Email Gateway." }, { "date": "2023-07-11T16:43:10+00:00", "number": "1.2.0", "summary": "Updated the fixed releases information for Cisco Secure Email Cloud Gateway." } ], "status": "final", "version": "1.2.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Secure Web Appliance", "product": { "name": "Cisco Secure Web Appliance ", "product_id": "CSAFPID-189789" } }, { "category": "product_family", "name": "Cisco Secure Email", "product": { "name": "Cisco Secure Email ", "product_id": "CSAFPID-189790" } }, { "category": "product_family", "name": "Cisco Secure Email and Web Manager", "product": { "name": "Cisco Secure Email and Web Manager ", "product_id": "CSAFPID-189791" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20120", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwe14247" }, { "system_name": "Cisco Bug ID", "text": "CSCwe18586" }, { "system_name": "Cisco Bug ID", "text": "CSCwe14250" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189791", "CSAFPID-189789", "CSAFPID-189790" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791", "CSAFPID-189790", "CSAFPID-189789" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189791", "CSAFPID-189789", "CSAFPID-189790" ] } ], "title": "Cisco Secure Email Gateway, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored Cross-Site Scripting Vulnerability" }, { "cve": "CVE-2023-20028", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwd50087" }, { "system_name": "Cisco Bug ID", "text": "CSCwd50094" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189789", "CSAFPID-189791" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791", "CSAFPID-189789" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189789", "CSAFPID-189791" ] } ], "title": "Cisco Secure Email and Web Manager and Cisco Secure Web Appliance Stored Cross-Site Scripting Vulnerability" }, { "cve": "CVE-2023-20119", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwe12624" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-189791" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-189791" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189791" ] } ], "title": "Cisco Secure Email and Web Manager Reflected Cross-Site Scripting Vulnerability" } ] }
ghsa-95pj-72hx-j6jm
Vulnerability from github
Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.
{ "affected": [], "aliases": [ "CVE-2023-20120" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-06-28T15:15:09Z", "severity": "MODERATE" }, "details": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.", "id": "GHSA-95pj-72hx-j6jm", "modified": "2023-06-28T15:30:23Z", "published": "2023-06-28T15:30:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20120" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
var-202306-1845
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-1845", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "secure email gateway", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-256" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-033" }, { "model": "secure email gateway", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-033" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-053" }, { "model": "secure email and web manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-256" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-050" }, { "model": "secure email and web manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-033" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.0-418" }, { "model": "secure email gateway", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-053" }, { "model": "secure email and web manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.1-053" }, { "model": "secure email gateway", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.0-418" }, { "model": "secure email gateway", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-050" }, { "model": "web security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-256" }, { "model": "secure email and web manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0.0-050" }, { "model": "secure email and web manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "14.0.0-418" }, { "model": "cisco secure email and web manager", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "15.0.0-050" }, { "model": "cisco secure email and web manager", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "14.0.1-033" }, { "model": "cisco secure email and web manager", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "14.0.1-053" }, { "model": "cisco secure email gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco secure email and web manager", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "15.0.0-256" }, { "model": "cisco web \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco secure email and web manager", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "14.0.0-418" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "cve": "CVE-2023-20120", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2023-20120", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.3, "id": "CVE-2023-20120", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2023-20120", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-20120", "trust": 1.0, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2023-20120", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2023-20120", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202306-2003", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "db": "NVD", "id": "CVE-2023-20120" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager; Cisco Secure Email Gateway, formerly Cisco Email Security Appliance (ESA); and Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. \nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. \nThis advisory is available at the following link:sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq\nAttention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure", "sources": [ { "db": "NVD", "id": "CVE-2023-20120" }, { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "VULMON", "id": "CVE-2023-20120" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-20120", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2023-024109", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202306-2003", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-20120", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-20120" }, { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "id": "VAR-202306-1845", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.45906568 }, "last_update_date": "2024-08-14T14:23:58.289000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-esa-sma-wsa-xss-cP9DuEmq", "trust": 0.8, "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" }, { "title": "Multiple Cisco product Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=244904" }, { "title": "Cisco: Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-esa-sma-wsa-xss-cP9DuEmq" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-20120" }, { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "CNNVD", "id": "CNNVD-202306-2003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-esa-sma-wsa-xss-cp9duemq" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-20120" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-20120/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-20120" }, { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-20120" }, { "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "db": "NVD", "id": "CVE-2023-20120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-01-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "date": "2023-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "date": "2023-06-28T15:15:09.760000", "db": "NVD", "id": "CVE-2023-20120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-01-30T06:38:00", "db": "JVNDB", "id": "JVNDB-2023-024109" }, { "date": "2023-07-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-2003" }, { "date": "2023-11-07T04:06:06.050000", "db": "NVD", "id": "CVE-2023-20120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-2003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting vulnerability in multiple Cisco Systems products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-024109" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-2003" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.