Cisco Bug: CSCvu53174 - ESA AppFault generated when a proxy users's password contains hashtags or question marks
Aug 12, 2020
- Cisco Email Security Appliance
Known Affected Releases
Symptom: This AppFault is generated: Fri Jun 5 11:20:53 2020 Critical: An application fault occurred: ('python2.6_10_amd64_nothr/urlparse.py port|82', "<type 'exceptions.ValueError'>", "invalid literal for int() with base 10: 'password_here'", '[_coro.pyx coro._coro._wrap1 (coro/_coro.c:8505)|757] [features/smartlicense_config.py sl_config_change|79] [features/smartlicense_config.py _set_values_to_agent_config|110] [python2.6_10_amd64_nothr/urlparse.py port|82]') Conditions: 1. The ESA is configured to use a Web Proxy under the 'Security Services > Service Updates' section, or its CLI equivalent 'updateconfig'. 2. The password of the user to authenticate against the web proxy contains hashtags '#' or question marks '?'
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases