A vulnerability in the web framework of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Known Affected Releases 10.5(2). Cisco Bug IDs: CSCvf25345.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100645 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039277 | Third Party Advisory VDB Entry |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf25345 | Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-cuc | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2017-09-07T21:00:00
Updated: 2017-09-08T09:57:01
Reserved: 2017-08-03T00:00:00
Link: CVE-2017-12212
JSON object: View
NVD Information
Status : Modified
Published: 2017-09-07T21:29:00.270
Modified: 2019-10-09T23:22:29.073
Link: CVE-2017-12212
JSON object: View
Redhat Information
No data.
CWE