CVE-2019-1665
Published Feb 21, 2019
Last updated 5 years ago
Overview
- Description
- A vulnerability in the web-based management interface of Cisco HyperFlex software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions prior to 3.5(1a) are affected.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:2.6\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D56AD98-9D0D-4ECA-8766-4F19A33F954D" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:2.6\\(1b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CEF2FCB-304F-4BDE-9668-C610ECBC2EBD" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:2.6\\(1d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4F1BF1D-5DC7-4F8A-BC50-D5ED26D4C015" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:2.6\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9831733F-FD4F-4603-B5E9-F4C87214E8AA" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF61D59F-2C04-4210-87C4-9F6C11EEAC7B" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E56E757-9DDB-49E1-A00A-1EFFB751E3D9" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD4BC158-9304-4C85-B054-549083B6A7F5" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "158B80ED-1BB9-44AE-A321-F313F25062D2" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7222C3-1EC3-4B30-A45E-987A995F3E7C" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1h\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2976280F-1B13-45A6-93A2-020F1AE86DA1" }, { "criteria": "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1i\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B14891F1-CA29-4D9A-9733-C654EB225CF8" } ], "operator": "OR" } ] } ]