Vigil@nce - Cisco ESA, SMA, WSA: Cross Site Scripting of uploader.swf
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting in uploader.swf of
Cisco ESA, SMA, WSA, in order to execute JavaScript code in the
context of the web site.
– Impacted products: AsyncOS, Cisco Content SMA, Cisco ESA, IronPort
Email, IronPort Management, IronPort Web, Cisco WSA
– Severity: 2/4
– Creation date: 26/02/2015
DESCRIPTION OF THE VULNERABILITY
The Cisco ESA, SMA, WSA product offers a web service.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting in
uploader.swf of Cisco ESA, SMA, WSA, in order to execute
JavaScript code in the context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cisco-ESA-SMA-WSA-Cross-Site-Scripting-of-uploader-swf-16272