Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-72c9-6vxw-8h9h

Опубликовано: 11 авг. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.9

Описание

A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server. Note: To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.

A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server. Note: To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.

EPSS

Процентиль: 36%
0.00155
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 4.9
nvd
больше 3 лет назад

A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server. Note: To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.

CVSS3: 4.9
fstec
больше 3 лет назад

Уязвимость реализации программного интерфейса RESTful Services (ERS) платформы управления политиками соединений Cisco Identity Services Engine, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 36%
0.00155
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-522