The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa - Vendor Advisory |
Information
Published : 2013-06-27 21:55
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3383
Mitre link : CVE-2013-3383
CVE.ORG link : CVE-2013-3383
JSON object : View
Products Affected
cisco
- web_security_appliance
- ironport_asyncos
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')