CVE-2022-20740
03.05.2022, 04:15
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.
Vendor | Product | Version |
---|---|---|
cisco | secure_firewall_management_center | 𝑥 < 6.6.5.2 |
cisco | secure_firewall_management_center | 6.7.0 ≤ 𝑥 < 7.0.2 |
cisco | secure_firewall_management_center | 7.1.0 ≤ 𝑥 < 7.1.0.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.