Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8397-p27v-5qrr

Опубликовано: 04 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.

Cisco will not release software updates that address this vulnerability.

{{value}} ["%7b%7bvalue%7d%7d"])}]]

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.

Cisco will not release software updates that address this vulnerability.

{{value}} ["%7b%7bvalue%7d%7d"])}]]

EPSS

Процентиль: 28%
0.00102
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-79
CWE-80

Связанные уязвимости

CVSS3: 5.8
nvd
больше 2 лет назад

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]

CVSS3: 5.8
fstec
больше 2 лет назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения IP-телефонов Cisco Small Business SPA500 Series, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 28%
0.00102
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-79
CWE-80