cve/2022/CVE-2022-20966.md

19 lines
1.5 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-20966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20966)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Identity%20Services%20Engine%20Software&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.6.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
2024-06-22 09:37:59 +00:00
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. Cisco has not yet released software updates that address this vulnerability.
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
- https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
#### Github
No PoCs found on GitHub currently.