Vulnerabilites related to cisco - content_security_management_appliance_sma_m190
Vulnerability from fkie_nvd
Published
2018-02-08 07:29
Modified
2024-11-21 03:37
Severity ?
Summary
A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103090 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040338 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040339 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103090 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040338 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040339 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:9.8.0-112:*:*:*:*:*:*:*", "matchCriteriaId": "6207857A-D150-4D91-AC50-5FCA71E4530A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.1-087:*:*:*:*:*:*:*", "matchCriteriaId": "8908CBEB-F0FF-4F63-B19B-4BF34AB23A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:email_security_appliance_firmware:11.0.0-274:*:*:*:*:*:*:*", "matchCriteriaId": "57B6BB66-1B7A-4F80-B8E3-D8F7E8F1AF4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c160:-:*:*:*:*:*:*:*", "matchCriteriaId": "50009089-506D-42B4-B34D-CFC719B0395B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8ED62C8-2B7E-47CA-BE16-00E02CA72763", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c370d:-:*:*:*:*:*:*:*", "matchCriteriaId": "93AF10FC-7988-446F-86E6-8A4E90762DA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c670:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1149EA5-37D0-4E1F-803D-A7A0658653FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:email_security_appliance_x1070:-:*:*:*:*:*:*:*", "matchCriteriaId": "E312DF25-A961-4682-B374-4A394431F8E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:content_security_management_appliance:10.0.0-096:*:*:*:*:*:*:*", "matchCriteriaId": "DD007BF4-5962-42EF-B374-64752149ACE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:content_security_management_appliance:10.1.0-037:*:*:*:*:*:*:*", "matchCriteriaId": "D30D450A-E060-41EA-890A-F3C0616006BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:content_security_management_appliance:10.1.0-052:*:*:*:*:*:*:*", "matchCriteriaId": "9BDC7E17-A545-4D87-857A-C545D82AE078", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:content_security_management_appliance:11.0.0-115:*:*:*:*:*:*:*", "matchCriteriaId": "70BB0721-EA85-4EF0-B794-307FC690ECDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "14B41A69-AFB0-4770-A8F4-82393F5B330F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m390:-:*:*:*:*:*:*:*", "matchCriteriaId": "3526625B-A42B-4529-B9A5-5BA4CC38DAA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m390x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9C3E48C-9A68-4BC7-9C1B-E651F6DCCBC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEEF3CE3-2A24-42CB-B73E-A6C6333A93E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m690x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FB17773-455A-42B0-822F-B43EF0CB9D7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295." }, { "lang": "es", "value": "Una vulnerabilidad en la cuarentena de spam de Cisco Email Security Appliance y Cisco Content Security Management Appliance podr\u00eda permitir que un atacante remoto autenticado descargue cualquier mensaje de la cuarentena de spam modificando la informaci\u00f3n de las cadenas del navegador. Esta vulnerabilidad se debe a la ausencia de validaci\u00f3n de cuentas de usuario autenticado. Un atacante podr\u00eda explotar esta vulnerabilidad modificando cadenas del navegador para ver mensajes enviados por otros usuarios a la cuarentena de spam en su compa\u00f1\u00eda. Cisco Bug IDs: CSCvg39759, CSCvg42295." } ], "id": "CVE-2018-0140", "lastModified": "2024-11-21T03:37:35.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-08T07:29:01.053", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103090" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040338" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040339" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-425" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-18 16:15
Modified
2025-08-11 17:32
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC0CD03-0E5A-44FE-A973-B658537B2AAF", "versionEndExcluding": "13.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F73AEFE-EAC5-4E2D-AECD-B1D5DE7B0029", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "24206121-4F6F-4268-B1F4-41974596C657", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m300v:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADDCAB99-22C9-41B2-B981-06F7911CB2F0", "vulnerable": false }, { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance_smav_m600v:-:*:*:*:*:*:*:*", "matchCriteriaId": "89795801-953E-4D11-8F86-4394DD4582AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m190:-:*:*:*:*:*:*:*", "matchCriteriaId": "14B41A69-AFB0-4770-A8F4-82393F5B330F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m195:-:*:*:*:*:*:*:*", "matchCriteriaId": "3582C8AF-36B0-49C4-9951-3D3745D38C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m395:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF84B5E-64EE-4F31-BD99-C869DA3C73E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m690:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEEF3CE3-2A24-42CB-B73E-A6C6333A93E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:content_security_management_appliance_sma_m695:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E54E9E-6FCA-4951-9162-35F9F57B6856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco AsyncOS Software para Cisco Content Security Management Appliance (SMA) podr\u00eda permitir que un atacante remoto autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. La vulnerabilidad existe porque se incluye informaci\u00f3n confidencial en las solicitudes HTTP que se intercambian entre el usuario y el dispositivo. Un atacante podr\u00eda aprovechar esta vulnerabilidad al observar las solicitudes HTTP sin procesar que se env\u00edan a la interfaz. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante obtener algunas de las contrase\u00f1as que se configuran en toda la interfaz. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad." } ], "id": "CVE-2021-1425", "lastModified": "2025-08-11T17:32:43.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-18T16:15:10.180", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-201" } ], "source": "psirt@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-1425 (GCVE-0-2021-1425)
Vulnerability from cvelistv5
Published
2024-11-18 15:36
Modified
2024-11-18 15:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-201 - Exposure of Sensitive Information Through Sent Data
Summary
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.
The vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Secure Email and Web Manager |
Version: N/A |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1425", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:58:03.148324Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:58:19.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Secure Email and Web Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;AsyncOS Software for Cisco\u0026nbsp;Content Security Management Appliance (SMA) could allow an authenticated, remote attacker to access sensitive information on an affected device.\r\nThe vulnerability exists because confidential information is being included in HTTP requests that are exchanged between the user and the device. An attacker could exploit this vulnerability by looking at the raw HTTP requests that are sent to the interface. A successful exploit could allow the attacker to obtain some of the passwords that are configured throughout the interface.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "Exposure of Sensitive Information Through Sent Data", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:36:48.271Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ" } ], "source": { "advisory": "cisco-sa-esa-sma-info-disclo-VOu2GHbZ", "defects": [ "CSCvw39308" ], "discovery": "EXTERNAL" }, "title": "Cisco Cisco Email Security Appliance and Content Security Management Appliance Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1425", "datePublished": "2024-11-18T15:36:48.271Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:58:19.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-0140 (GCVE-0-2018-0140)
Vulnerability from cvelistv5
Published
2018-02-08 07:00
Modified
2024-12-02 21:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco Email Security Appliance and Cisco Content Security Management Appliance |
Version: Cisco Email Security Appliance and Cisco Content Security Management Appliance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040339", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040339" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm" }, { "name": "103090", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103090" }, { "name": "1040338", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040338" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T18:55:19.184419Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:08:30.247Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Email Security Appliance and Cisco Content Security Management Appliance", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco Email Security Appliance and Cisco Content Security Management Appliance" } ] } ], "datePublic": "2018-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-22T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1040339", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040339" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm" }, { "name": "103090", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103090" }, { "name": "1040338", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Email Security Appliance and Cisco Content Security Management Appliance", "version": { "version_data": [ { "version_value": "Cisco Email Security Appliance and Cisco Content Security Management Appliance" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the spam quarantine of Cisco Email Security Appliance and Cisco Content Security Management Appliance could allow an authenticated, remote attacker to download any message from the spam quarantine by modifying browser string information. The vulnerability is due to a lack of verification of authenticated user accounts. An attacker could exploit this vulnerability by modifying browser strings to see messages submitted by other users to the spam quarantine within their company. Cisco Bug IDs: CSCvg39759, CSCvg42295." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "1040339", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040339" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm" }, { "name": "103090", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103090" }, { "name": "1040338", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040338" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0140", "datePublished": "2018-02-08T07:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-12-02T21:08:30.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }