‫ Cisco Emergency Responder Multiple Vulnerabilities


Date: 2014/04/04


Cisco Emergency Responder 8.x


Some weaknesses and two vulnerabilities have been reported in Cisco Emergency Responder, which can be exploited by malicious people to conduct spoofing, cross-site scripting, and cross-site request forgery attacks.

1)Input passed via some unspecified parameters is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

2)The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. apply certain changes to the application when a logged-in user visits a specially crafted web page.

3)Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Note: Additionally a weakness exists, which can be exploited to manipulate certain dynamic content.

The weaknesses and vulnerabilities are reported in versions 8.6(1.10000.11) and 8.6 and prior. Other versions may also be affected.


No official solution is currently available.


Cisco (CSCun37882, CSCun37909, CSCun24250, CSCun24384:)



بدون نظر
شما برای نظر دادن باید وارد شوید


تاریخ ایجاد: 17 فروردین 1393


امتیاز شما
تعداد امتیازها:0