ID

VAR-201301-0083


CVE

CVE-2012-6029


TITLE

Cisco NAC Appliance upper Web Cross-site scripting vulnerability in authentication function

Trust: 0.8

sources: JVNDB: JVNDB-2013-001341

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in the web-authentication function on the Cisco NAC Appliance 4.9.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) cm or (2) uri parameters to (a) perfigo_weblogin.jsp, or the (3) cm, (4) provider, (5) session, (6) uri, (7) userip, or (8) username parameters to (b) perfigo_cm_validate.jsp, aka Bug ID CSCud15109. Cisco NAC Appliance upper Web There is a cross-site scripting vulnerability in the authentication function. The problem is Bug ID CSCud15109 It is a problem.Any request via a crafted request by a third party Web Script or HTML May be inserted. Cisco Network Admission Control is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is tracked by Cisco BugID CSCud15109. The Cisco Network Admission Control (NAC) system, consisting of Cisco NAC Manager and servers, is the policy component of the Cisco TrustSec solution. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Network Admission Control Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA52016 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/52016/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=52016 RELEASE DATE: 2013-01-30 DISCUSS ADVISORY: http://secunia.com/advisories/52016/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/52016/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=52016 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco Network Admission Control (NAC), which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input is not properly sanitised in the web authentication function before being returned to the user. SOLUTION: Apply updates. Please see the vendor's advisory for more information. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-6029 // JVNDB: JVNDB-2013-001341 // BID: 57632 // VULHUB: VHN-59310 // PACKETSTORM: 119912

AFFECTED PRODUCTS

vendor:ciscomodel:nac appliancescope:eqversion:4.7

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:3.6

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.5

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.7.2

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.7.1

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.0

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.8

Trust: 1.6

vendor:ciscomodel:nac appliancescope:eqversion:4.6

Trust: 1.6

vendor:ciscomodel:nac appliancescope:lteversion:4.9.2

Trust: 1.0

vendor:ciscomodel:nac appliancescope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:nac appliancescope:eqversion:3.6 to 4.8

Trust: 0.8

vendor:ciscomodel:nac appliancescope:eqversion:4.9.2

Trust: 0.6

vendor:ciscomodel:network admission controlscope:eqversion:4.1.2

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.0.6

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.9

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.8.2

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.8.1

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.8.0

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:4.0

Trust: 0.3

sources: BID: 57632 // JVNDB: JVNDB-2013-001341 // CNNVD: CNNVD-201301-579 // NVD: CVE-2012-6029

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-6029
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-6029
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-579
value: MEDIUM

Trust: 0.6

VULHUB: VHN-59310
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-6029
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-59310
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-59310 // JVNDB: JVNDB-2013-001341 // CNNVD: CNNVD-201301-579 // NVD: CVE-2012-6029

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-59310 // JVNDB: JVNDB-2013-001341 // NVD: CVE-2012-6029

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-579

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 119912 // CNNVD: CNNVD-201301-579

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001341

PATCH

title:Cisco NAC Appliance Cross-Site Scripting Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6029

Trust: 0.8

sources: JVNDB: JVNDB-2013-001341

EXTERNAL IDS

db:NVDid:CVE-2012-6029

Trust: 2.9

db:JVNDBid:JVNDB-2013-001341

Trust: 0.8

db:SECUNIAid:52016

Trust: 0.8

db:CNNVDid:CNNVD-201301-579

Trust: 0.7

db:CISCOid:20130130 CISCO NAC APPLIANCE CROSS-SITE SCRIPTING VULNERABILITY

Trust: 0.6

db:BIDid:57632

Trust: 0.4

db:VULHUBid:VHN-59310

Trust: 0.1

db:PACKETSTORMid:119912

Trust: 0.1

sources: VULHUB: VHN-59310 // BID: 57632 // JVNDB: JVNDB-2013-001341 // PACKETSTORM: 119912 // CNNVD: CNNVD-201301-579 // NVD: CVE-2012-6029

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2012-6029

Trust: 1.8

url:http://www.secureworks.com/cyber-threat-intelligence/advisories/swrx-2013-001/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6029

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6029

Trust: 0.8

url:http://secunia.com/advisories/52016

Trust: 0.6

url:http://www.cisco.com/en/us/products/ps6128/index.html

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=52016

Trust: 0.1

url:http://secunia.com/advisories/52016/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/52016/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-59310 // BID: 57632 // JVNDB: JVNDB-2013-001341 // PACKETSTORM: 119912 // CNNVD: CNNVD-201301-579 // NVD: CVE-2012-6029

CREDITS

Reported by the vendor

Trust: 0.3

sources: BID: 57632

SOURCES

db:VULHUBid:VHN-59310
db:BIDid:57632
db:JVNDBid:JVNDB-2013-001341
db:PACKETSTORMid:119912
db:CNNVDid:CNNVD-201301-579
db:NVDid:CVE-2012-6029

LAST UPDATE DATE

2025-04-11T23:15:27.197000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-59310date:2013-02-04T00:00:00
db:BIDid:57632date:2013-01-30T00:00:00
db:JVNDBid:JVNDB-2013-001341date:2013-02-01T00:00:00
db:CNNVDid:CNNVD-201301-579date:2013-02-04T00:00:00
db:NVDid:CVE-2012-6029date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-59310date:2013-01-31T00:00:00
db:BIDid:57632date:2013-01-30T00:00:00
db:JVNDBid:JVNDB-2013-001341date:2013-02-01T00:00:00
db:PACKETSTORMid:119912date:2013-01-31T07:44:59
db:CNNVDid:CNNVD-201301-579date:2013-01-30T00:00:00
db:NVDid:CVE-2012-6029date:2013-01-31T12:06:18.283