A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nexus-dashboard-xss-xc5BcgsQ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2023-02-16T15:27:54.894Z
Updated: 2024-01-25T16:57:39.267Z
Reserved: 2022-10-27T18:47:50.319Z
Link: CVE-2023-20053
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-01T08:15:12.057
Modified: 2024-01-25T17:15:27.847
Link: CVE-2023-20053
JSON object: View
Redhat Information
No data.
CWE