CERTA-2008-AVI-256
Vulnerability from certfr_avis - Published: 2008-05-20 - Updated: 2008-05-20
Une vulnérabilité a été découverte dans Cisco Broadband Service Manager. Elle peut être exploitée afin de réaliser des attaques par injection de code indirecte (Cross Site Scripting).
Description
Une vulnérabilité a été découverte dans la gestion du paramètre msg par la page AccessCodeStart.asp dans Cisco Broadband Service Manager. Cette vulnérabilité peut être exploitée afin de réaliser une attaque par injection de code indirecte (Cross Site Scripting).
Solution
Appliquer la mise à jour BBSMPatch5332.zip (cf. section Documentation).
Cisco Building Broadband Service Manager 5.x.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eCisco Building Broadband Service Manager 5.x.\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la gestion du param\u00e8tre msg par\nla page AccessCodeStart.asp dans Cisco Broadband Service Manager. Cette\nvuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e afin de r\u00e9aliser une attaque par\ninjection de code indirecte (Cross Site Scripting).\n\n## Solution\n\nAppliquer la mise \u00e0 jour BBSMPatch5332.zip (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2165",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2165"
}
],
"initial_release_date": "2008-05-20T00:00:00",
"last_revision_date": "2008-05-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco (Bugtraq):",
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-05/0183.html"
},
{
"title": "Mise \u00e0 jour Cisco : http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=5.3\u0026mdfid=278455427\u0026sftType=Building%20Broadband%20Service%20Manager%20(BBSM)%20Updates\u0026optPlat=\u0026nodecount=2\u0026edesignator=null\u0026modelName=Cisco%20Building%20Broadband%20Service%20Manager%205.3\u0026treeMdfld=281527126\u0026treeName=Network%20Monitoring%20and%20Management",
"url": "http://tools.cisco.com/support/downloads/go/[...]treeName=Network%20Monitoring%20and%20Management"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco (Bugtraq):",
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-05/0166.html"
}
],
"reference": "CERTA-2008-AVI-256",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-05-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Cisco Broadband Service Manager.\nElle peut \u00eatre exploit\u00e9e afin de r\u00e9aliser des attaques par injection de\ncode indirecte (\u003cspan class=\"textit\"\u003eCross Site Scripting\u003c/span\u003e).\n",
"title": "Vuln\u00e9rabilit\u00e9 de Cisco Building Broadband Service Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 CISCO via Bugtraq du 14 mai 2008",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…