Guest

Preview Tool

Cisco Bug: CSCsy82093 - XSS via Host: header in WebVPN Request.

Last Modified

Nov 09, 2016

Products (1)

  • Cisco ASA 5500-X Series Firewalls

Known Affected Releases

7.2(2.22)

Description (partial)

Symptom:
Failure to filter potentally malicous HTML or Script code from the Host: header of an HTTP POST request submited to the WebVPN login form.
Conditions:
System is running an affected version of ASA software and has enabled Clientless WebVPN functionality.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.