ID

VAR-E-201311-0106


CVE

cve_id:CVE-2013-6780

Trust: 0.8

sources: BID: 63660 // PACKETSTORM: 130527

TITLE

Cisco Ironport AsyncOS Cross Site Scripting

Trust: 0.6

sources: EDBNET: 80134

AFFECTED PRODUCTS

vendor:ciscomodel:ironport asyncosscope: - version: -

Trust: 0.5

vendor:yahoomodel:yuiscope:eqversion:2.8.1

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.5.2

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.8.0

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.7.0

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.6.0

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.5.1

Trust: 0.3

vendor:yahoomodel:yuiscope:eqversion:2.5.0

Trust: 0.3

sources: BID: 63660 // PACKETSTORM: 130527

EXPLOIT

Vendor: Cisco
Product webpage: http://www.cisco.com
Affected version(s):
Cisco Ironport ESA - AsyncOS 8.0.1-023
Cisco Ironport WSA - AsyncOS 8.5.5-022
Cisco Ironport SMA - AsyncOS 8.4.0-126
Date: 24/02/2015
Credits: Glafkos Charalambous
CVE: CVE-2013-6780

Disclosure Timeline:
28-10-2014: Vendor Notification
28-10-2014: Vendor Response/Feedback
22-01-2015: Vendor Fix/Patch
24-02-2015: Public Disclosure

Description:
Cisco AsyncOS is vulnerable to unauthenticated Cross-site scripting (XSS), caused by improper validation
of user supplied input in the (uploader.swf) Uploader component in Yahoo! versions 2.5.0 through 2.9.0.

An attacker is able to inject arbitrary web script or HTML via the allowedDomain parameter.

XSS Payload:
http(s)://domain.com/yui/uploader/assets/uploader.swf?allowedDomain=\"})))}catch(e){alert('XSS');}//

References:
https://tools.cisco.com/bugsearch/bug/CSCur44409
https://tools.cisco.com/bugsearch/bug/CSCur89626
https://tools.cisco.com/bugsearch/bug/CSCur89624
http://yuilibrary.com/support/20131111-vulnerability/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6780

Trust: 0.6

sources: EDBNET: 80134

PRICE

free

Trust: 0.6

sources: EDBNET: 80134

TYPE

xss

Trust: 0.5

sources: PACKETSTORM: 130527

TAGS

tag:exploit

Trust: 0.5

tag:xss

Trust: 0.5

sources: PACKETSTORM: 130527

EXTERNAL IDS

db:NVDid:CVE-2013-6780

Trust: 1.4

db:EDBNETid:80134

Trust: 0.6

db:PACKETSTORMid:130527

Trust: 0.5

db:BIDid:63660

Trust: 0.3

sources: BID: 63660 // PACKETSTORM: 130527 // EDBNET: 80134

REFERENCES

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-6780

Trust: 0.5

url:http://yuilibrary.com/

Trust: 0.3

sources: BID: 63660 // PACKETSTORM: 130527 // EDBNET: 80134

SOURCES

db:BIDid:63660
db:PACKETSTORMid:130527
db:EDBNETid:80134

LAST UPDATE DATE

2022-07-27T09:54:22.886000+00:00


SOURCES UPDATE DATE

db:BIDid:63660date:2015-04-13T20:44:00

SOURCES RELEASE DATE

db:BIDid:63660date:2013-11-11T00:00:00
db:PACKETSTORMid:130527date:2015-02-25T17:30:18
db:EDBNETid:80134date:2015-02-25T00:00:00