cve/2024/CVE-2024-20405.md

23 lines
1.6 KiB
Markdown
Raw Normal View History

2024-06-10 07:22:43 +00:00
### [CVE-2024-20405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20405)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Finesse&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Packaged%20Contact%20Center%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Unified%20Contact%20Center%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Unified%20Contact%20Center%20Express&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2012.6(2)%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20N%2FA%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Input%20Validation&color=brighgreen)
### Description
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/AbdElRahmanEzzat1995/CVE-2024-20405
- https://github.com/nomi-sec/PoC-in-GitHub