Cisco Prime Service Catalog URL Redirect Attack Vulnerability
A vulnerability in the web framework of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a web URL redirect attack against a user who is logged in to an affected system.
The vulnerability is due to insufficient input validation for some of the parameters that are passed to an affected web server. An attacker could exploit this vulnerability by modifying URL input to redirect to a malicious site, which could launch a phishing attack that the attacker could use to obtain confidential information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2kVNtwo A vulnerability in the web framework of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a web URL redirect attack against a user who is logged in to an affected system.
The vulnerability is due to insufficient input validation for some of the parameters that are passed to an affected web server. An attacker could exploit this vulnerability by modifying URL input to redirect to a malicious site, which could launch a phishing attack that the attacker could use to obtain confidential information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2kVNtwo
Security Impact Rating: Medium
CVE: CVE-2017-3810
from Cisco Security Advisory http://ift.tt/2kVNtwo
The vulnerability is due to insufficient input validation for some of the parameters that are passed to an affected web server. An attacker could exploit this vulnerability by modifying URL input to redirect to a malicious site, which could launch a phishing attack that the attacker could use to obtain confidential information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2kVNtwo A vulnerability in the web framework of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a web URL redirect attack against a user who is logged in to an affected system.
The vulnerability is due to insufficient input validation for some of the parameters that are passed to an affected web server. An attacker could exploit this vulnerability by modifying URL input to redirect to a malicious site, which could launch a phishing attack that the attacker could use to obtain confidential information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2kVNtwo
Security Impact Rating: Medium
CVE: CVE-2017-3810
from Cisco Security Advisory http://ift.tt/2kVNtwo