The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa - Vendor Advisory | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma - Vendor Advisory | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa - Vendor Advisory |
Information
Published : 2013-06-27 21:55
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3384
Mitre link : CVE-2013-3384
CVE.ORG link : CVE-2013-3384
JSON object : View
Products Affected
cisco
- web_security_appliance
- ironport_asyncos
- content_security_management
- email_security_appliance_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')