CVE-2018-0251 (CNNVD-201804-1097)

MEDIUM
中文标题:
多款Cisco产品Adaptive Security Appliance Software 跨站脚本漏洞
英文标题:
A vulnerability in the Web Server Authentication Required screen of the Clientless Secure Sockets La...
CVSS分数: 6.1
发布时间: 2018-04-19 20:00:00
漏洞类型: 跨站脚本
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco 3000 Series Industrial Security Appliances等都是美国思科(Cisco)公司的不同系列的安全设备。Adaptive Security Appliance(ASA)Software是其中的一套操作系统。Clientless Secure Sockets Layer(SSL)VPN是其中的一个SSL(安全套接层协议)VPN应用程序。 多款Cisco产品中的ASA Software的Clientless SSL VPN门户的Web服务器身份验证请求页面存在跨站脚本漏洞,该漏洞源于程序没有充分的校验用户提交的请求。远程攻击者可通过诱使用户点击特制的链接利用该漏洞在门户的上下文中执行任意脚本代码或访问基于浏览器的敏感信息。以下产品受到影响:Cisco 3000 Series Industrial Security Appliances;Adaptive Security Virtual Appliance (ASAv);ASA 5500 Series Adaptive Security Appliances;ASA 5500-X Series Next-Generation Firewalls;用于Cisco Catalyst 6500 Series Switches的ASA Services Module;用于Cisco 7600 Series Routers的ASA Services Module。

英文描述:

A vulnerability in the Web Server Authentication Required screen of the Clientless Secure Sockets Layer (SSL) VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of that portal on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the portal or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco ASA Software: 3000 Series Industrial Security Appliances, Adaptive Security Virtual Appliance (ASAv), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches, ASA Services Module for Cisco 7600 Series Routers. Cisco Bug IDs: CSCvh20742.

CWE类型:
CWE-79
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco adaptive_security_appliance_software 9.8\(2.15\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8\(2.15\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 9.9\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9\(1\):*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
103926 vdb-entry
cve.org
访问
1040714 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
CVSS评分详情
6.1
MEDIUM
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS版本: 3.0
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2018-04-19 20:00:00
修改时间:
2024-11-29 15:16:20
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:39
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0251 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0251 2025-11-11 14:55:54 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201804-1097 2025-11-11 15:10:00 2025-11-11 07:53:39
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:39
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-201804-1097; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 跨站脚本
  • cnnvd_id: 未提取 -> CNNVD-201804-1097
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
cvss_score: 未提取 → 6.1; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 6.1
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']