Cisco Security Advisory - Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

Started by Netwörkheäd, May 20, 2022, 06:17:27 PM

Previous topic - Next topic

Netwörkheäd

Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

<p>A vulnerability in the web applications of Cisco&nbsp;UCS Director could allow an authenticated, remote attacker to <span class="TextRun Highlight SCXO16456276 BCX2"><span class="NormalTextRun SCXO16456276 BCX2">conduct a cross-site scripting attack on an affected system.</span></span></p>
<p>This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7" target="_blank">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7</a></p>

     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2022-20765
Source: Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability
Let's not argue. Let's network!