CVE-2020-3117

A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:content_security_management_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*
cpe:2.3:a:cisco:web_security_appliance:12.0.1-268:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-wsa-sma-header-inject - Vendor Advisory

Information

Published : 2020-09-23 01:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3117

Mitre link : CVE-2020-3117

CVE.ORG link : CVE-2020-3117


JSON object : View

Products Affected

cisco

  • web_security_appliance
  • content_security_management_appliance
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

NVD-CWE-Other