A vulnerability in the web framework of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Known Affected Releases 10.5(2). Cisco Bug IDs: CSCvf25345.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100645 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039277 | Third Party Advisory VDB Entry |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf25345 | Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cuc | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-09-07 21:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12212
Mitre link : CVE-2017-12212
CVE.ORG link : CVE-2017-12212
JSON object : View
Products Affected
cisco
- unity_connection
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')