A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject - Vendor Advisory |
Information
Published : 2020-09-23 01:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3117
Mitre link : CVE-2020-3117
CVE.ORG link : CVE-2020-3117
JSON object : View
Products Affected
cisco
- web_security_appliance
- content_security_management_appliance
CWE
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
NVD-CWE-Other