CERTA-2008-AVI-256
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Cisco Broadband Service Manager. Elle peut être exploitée afin de réaliser des attaques par injection de code indirecte (Cross Site Scripting).

Description

Une vulnérabilité a été découverte dans la gestion du paramètre msg par la page AccessCodeStart.asp dans Cisco Broadband Service Manager. Cette vulnérabilité peut être exploitée afin de réaliser une attaque par injection de code indirecte (Cross Site Scripting).

Solution

Appliquer la mise à jour BBSMPatch5332.zip (cf. section Documentation).

Cisco Building Broadband Service Manager 5.x.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eCisco Building Broadband Service  Manager 5.x.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la gestion du param\u00e8tre msg par\nla page AccessCodeStart.asp dans Cisco Broadband Service Manager. Cette\nvuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e afin de r\u00e9aliser une attaque par\ninjection de code indirecte (Cross Site Scripting).\n\n## Solution\n\nAppliquer la mise \u00e0 jour BBSMPatch5332.zip (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-2165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2165"
    }
  ],
  "initial_release_date": "2008-05-20T00:00:00",
  "last_revision_date": "2008-05-20T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco (Bugtraq):",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2008-05/0183.html"
    },
    {
      "title": "Mise \u00e0 jour Cisco :      http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=5.3\u0026mdfid=278455427\u0026sftType=Building%20Broadband%20Service%20Manager%20(BBSM)%20Updates\u0026optPlat=\u0026nodecount=2\u0026edesignator=null\u0026modelName=Cisco%20Building%20Broadband%20Service%20Manager%205.3\u0026treeMdfld=281527126\u0026treeName=Network%20Monitoring%20and%20Management",
      "url": "http://tools.cisco.com/support/downloads/go/[...]treeName=Network%20Monitoring%20and%20Management"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco (Bugtraq):",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2008-05/0166.html"
    }
  ],
  "reference": "CERTA-2008-AVI-256",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-05-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Cisco Broadband Service Manager.\nElle peut \u00eatre exploit\u00e9e afin de r\u00e9aliser des attaques par injection de\ncode indirecte (\u003cspan class=\"textit\"\u003eCross Site Scripting\u003c/span\u003e).\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Cisco Building Broadband Service Manager",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 CISCO via Bugtraq du 14 mai 2008",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…