Lucene search

K
ciscoCiscoCISCO-SA-UCS-XSS-UQSME3L7
HistoryMay 18, 2022 - 4:00 p.m.

Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

2022-05-1816:00:00
tools.cisco.com
10
cisco
ucs director
web app
cross-site scripting
vulnerability
javascript
security
advisory
update

EPSS

0.001

Percentile

29.2%

A vulnerability in the web applications of Cisco UCS Director could allow an authenticated, remote attacker to conduct a cross-site scripting attack on an affected system.

This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7”]

Affected configurations

Vulners
Node
ciscoucs_directorMatchany
OR
ciscoucs_directorMatchany
VendorProductVersionCPE
ciscoucs_directoranycpe:2.3:a:cisco:ucs_director:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

29.2%

Related for CISCO-SA-UCS-XSS-UQSME3L7