CVE-2012-6029
Published Jan 31, 2013
Last updated 12 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the web-authentication function on the Cisco NAC Appliance 4.9.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) cm or (2) uri parameters to (a) perfigo_weblogin.jsp, or the (3) cm, (4) provider, (5) session, (6) uri, (7) userip, or (8) username parameters to (b) perfigo_cm_validate.jsp, aka Bug ID CSCud15109.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nac_appliance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B33B0326-450D-4A0D-921C-882648C0D909", "versionEndIncluding": "4.9.2" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A22731E5-02B7-481A-925D-DF0B6A1CCA68" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0688C2-582A-49DE-917E-C74124F4ADD5" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11D5E336-EA9B-449E-B9B9-EA7F5901545D" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EE45899-8EA3-411F-82ED-C731498AAD65" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8953EA9-0F23-403A-974C-61EA0339C42B" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21BC1BB3-BB3B-455B-A266-827294717B70" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA925FCD-C2DB-451E-8C03-958C3A40B342" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04A81F45-7C52-48A6-8DF7-13286741DBE6" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B764128-14BA-41A3-BE45-CB3D7D39DE5A" }, { "criteria": "cpe:2.3:h:cisco:nac_appliance:4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21EAE487-8FC8-4518-A260-DE6DB2E217C7" } ], "operator": "OR" } ] } ]