Guest

Preview Tool

Cisco Bug: CSCvu53174 - ESA AppFault generated when a proxy users's password contains hashtags or question marks

Last Modified

Aug 12, 2020

Products (1)

  • Cisco Email Security Appliance

Known Affected Releases

13.0.0-392 13.5.0-263

Description (partial)

Symptom:
This AppFault is generated:

Fri Jun  5 11:20:53 2020 Critical: An application fault occurred: ('python2.6_10_amd64_nothr/urlparse.py port|82', "<type 'exceptions.ValueError'>", "invalid literal for int() with base 10: 'password_here'", '[_coro.pyx coro._coro._wrap1 (coro/_coro.c:8505)|757] [features/smartlicense_config.py sl_config_change|79] [features/smartlicense_config.py _set_values_to_agent_config|110] [python2.6_10_amd64_nothr/urlparse.py port|82]')

Conditions:
1. The ESA is configured to use a Web Proxy under the 'Security Services > Service Updates' section, or its CLI equivalent 'updateconfig'.

2. The password of the user to authenticate against the web proxy contains hashtags '#' or question marks '?'
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.