The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html - Exploit | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0624 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/72702 - | |
References | () http://www.securitytracker.com/id/1031781 - | |
References | () http://www.securitytracker.com/id/1031782 - |
Information
Published : 2015-02-21 11:59
Updated : 2024-11-21 02:23
NVD link : CVE-2015-0624
Mitre link : CVE-2015-0624
CVE.ORG link : CVE-2015-0624
JSON object : View
Products Affected
cisco
- web_security_appliance
- content_security_management_appliance
- email_security_appliance_firmware
CWE
CWE-20
Improper Input Validation