2022-10-27 19:01:24 +00:00
{
2023-07-12 14:00:39 +00:00
"data_version" : "4.0" ,
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
2022-10-27 19:01:24 +00:00
"CVE_data_meta" : {
"ID" : "CVE-2023-20119" ,
2023-07-12 14:00:39 +00:00
"ASSIGNER" : "psirt@cisco.com" ,
"STATE" : "PUBLIC"
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, formerly known as Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
2024-01-25 17:03:41 +00:00
"value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" ,
"cweId" : "CWE-79"
2023-07-12 14:00:39 +00:00
}
]
}
]
2022-10-27 19:01:24 +00:00
} ,
2023-06-28 14:33:49 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
2023-07-12 14:00:39 +00:00
"vendor_name" : "Cisco" ,
2023-06-28 14:33:49 +00:00
"product" : {
"product_data" : [
{
2024-01-25 17:03:41 +00:00
"product_name" : "Cisco Secure Email and Web Manager" ,
2023-06-28 14:33:49 +00:00
"version" : {
"version_data" : [
{
2023-07-12 14:00:39 +00:00
"version_affected" : "=" ,
"version_value" : "11.0.0-115"
} ,
{
"version_affected" : "=" ,
"version_value" : "11.0.1-161"
} ,
{
"version_affected" : "=" ,
"version_value" : "11.5.1-105"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.0.0-452"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.0.1-011"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.5.0-636"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.5.0-658"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.5.0-678"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.5.0-670"
} ,
{
"version_affected" : "=" ,
"version_value" : "13.0.0-277"
} ,
{
"version_affected" : "=" ,
"version_value" : "13.6.2-078"
} ,
{
"version_affected" : "=" ,
"version_value" : "13.8.1-068"
} ,
{
"version_affected" : "=" ,
"version_value" : "13.8.1-074"
} ,
{
"version_affected" : "=" ,
"version_value" : "13.8.1-108"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.8.1-002"
} ,
{
"version_affected" : "=" ,
"version_value" : "12.8.1-021"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.0.0-404"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.1.0-223"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.1.0-227"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.2.0-212"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.2.0-224"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.2.1-020"
} ,
{
"version_affected" : "=" ,
"version_value" : "14.3.0-120"
2023-06-28 14:33:49 +00:00
}
]
}
}
]
2023-07-12 14:00:39 +00:00
}
2023-06-28 14:33:49 +00:00
}
]
}
} ,
2023-07-12 14:00:39 +00:00
"references" : {
"reference_data" : [
2022-10-27 19:01:24 +00:00
{
2023-07-12 14:00:39 +00:00
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq" ,
"refsource" : "MISC" ,
"name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-cP9DuEmq"
2022-10-27 19:01:24 +00:00
}
]
2023-06-28 14:33:49 +00:00
} ,
2023-07-12 14:00:39 +00:00
"source" : {
"advisory" : "cisco-sa-esa-sma-wsa-xss-cP9DuEmq" ,
"discovery" : "INTERNAL" ,
"defects" : [
"CSCwe12624"
]
} ,
2023-06-28 14:33:49 +00:00
"exploit" : [
{
2023-07-12 14:00:39 +00:00
"lang" : "en" ,
"value" : "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
2023-06-28 14:33:49 +00:00
}
] ,
"impact" : {
2023-07-12 14:00:39 +00:00
"cvss" : [
2023-06-28 14:33:49 +00:00
{
2023-07-12 14:00:39 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE"
2023-06-28 14:33:49 +00:00
}
]
2022-10-27 19:01:24 +00:00
}
2023-06-28 15:00:40 +00:00
}