Vigil@nce - Cisco ESA, SMA, WSA: HTTP redirect
February 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can deceive the user of Cisco ESA, SMA, or WSA, in
order to redirect him to a malicious site.
– Impacted products: AsyncOS, Cisco Content SMA, Cisco ESA, IronPort
Email, IronPort Management, IronPort Web, Cisco WSA
– Severity: 1/4
– Creation date: 23/02/2015
DESCRIPTION OF THE VULNERABILITY
The Cisco Email Security Appliance, Cisco Content Security
Management Appliance and Cisco Web Security Appliance products
offers a web service.
However, the web service accepts to redirect the victim with no
warning, to an external site indicated by the attacker.
An attacker can therefore deceive the user of Cisco ESA, SMA, or
WSA, in order to redirect him to a malicious site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cisco-ESA-SMA-WSA-HTTP-redirect-16246