### [CVE-2024-20377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20377) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Firepower%20Management%20Center&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%207.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen) ### Description A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to the web-based management interface not properly validating user-supplied input. An attacker could exploit this vulnerability by by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. ### POC #### Reference - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer #### Github No PoCs found on GitHub currently.