Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-20337

Опубликовано: 06 мар. 2024
Источник: nvd
CVSS3: 8.2
EPSS Низкий

Описание

A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:cisco:secure_client:*:*:*:*:*:*:*:*
Версия от 4.10.04065 (включая) до 4.10.08025 (исключая)
cpe:2.3:a:cisco:secure_client:*:*:*:*:*:*:*:*
Версия от 5.0.00529 (включая) до 5.1.2.42 (исключая)

Одно из

cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 89%
0.04953
Низкий

8.2 High

CVSS3

Дефекты

CWE-93

Связанные уязвимости

CVSS3: 8.2
github
почти 2 года назад

A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.

CVSS3: 8.2
fstec
почти 2 года назад

Уязвимость средства обеспечения безопасности конечных точек Cisco Secure Client (ранее Cisco AnyConnect Secure Mobility Client) связана с непринятием мер по нейтрализации CRLF-последовательностей, позволяющая нарушителю выполнить произвольный код в браузере

EPSS

Процентиль: 89%
0.04953
Низкий

8.2 High

CVSS3

Дефекты

CWE-93