Auto-merge PR#3136

Auto-merge PR#3136
This commit is contained in:
CVE Team 2020-01-27 17:10:18 -05:00 committed by GitHub
commit f2b4566859
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -18,7 +18,7 @@
"version_data": [
{
"affected": "<",
"version_value": "n/a"
"version_value": "11.1(3)"
}
]
}
@ -37,16 +37,10 @@
"description_data": [
{
"lang": "eng",
"value": "[CVE-2020-3136_su] A vulnerability in the web-based management interface of Cisco Jabber Guest could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information."
"value": "A vulnerability in the web-based management interface of Cisco Jabber Guest could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. This vulnerability affected Cisco Jabber Guest releases 11.1(2) and earlier."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "[CVE-2020-3136_ex] "
}
],
"impact": {
"cvss": {
"baseScore": "6.1",
@ -84,4 +78,4 @@
],
"discovery": "INTERNAL"
}
}
}