CVE-2019-15253 (CNNVD-202002-126)

MEDIUM 有利用代码
中文标题:
Cisco Digital Network Architecture Center 跨站脚本漏洞
英文标题:
Cisco Digital Network Architecture Center Stored Cross-Site Scripting Vulnerability
CVSS分数: 5.4
发布时间: 2020-02-05 17:30:15
漏洞类型: 跨站脚本
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Cisco Digital Network Architecture Center(DNA Center)是美国思科(Cisco)公司的一套数字网络体系结构解决方案。该方案能够扩展并保护网络内的设备、应用程序等。 Cisco DNA Center Software 1.3.0.6之前版本和1.3.1.4之前版本中的Web管理界面存在跨站脚本漏洞,该漏洞源于程序没有充分验证用户提交的输入。远程攻击者可通过诱使用户点击特制的链接利用该漏洞执行任意脚本代码或访问基于浏览器的敏感信息。

英文描述:

A vulnerability in the web-based management interface of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker needs administrator credentials. This vulnerability affects Cisco DNA Center Software releases earlier than 1.3.0.6 and 1.3.1.4.

CWE类型:
CWE-79
标签:
webapps java Dylan Garnaud
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Cisco Cisco Digital Network Architecture Center (DNA Center) 1.3.0.6 - - cpe:2.3:a:cisco:cisco_digital_network_architecture_center_(dna_center):1.3.0.6:*:*:*:*:*:*:*
Cisco Cisco Digital Network Architecture Center (DNA Center) 1.3.1.4 - - cpe:2.3:a:cisco:cisco_digital_network_architecture_center_(dna_center):1.3.1.4:*:*:*:*:*:*:*
cisco catalyst_center * - - cpe:2.3:a:cisco:catalyst_center:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20200205 Cisco Digital Network Architecture Center Stored Cross-Site Scripting Vulnerability vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ExploitDB EDB-48459 EXPLOIT
exploitdb
访问
Download Exploit EDB-48459 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2019-15253 ADVISORY
cve.org
访问
CVSS评分详情
3.0 (cna)
MEDIUM
5.4
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2020-02-05 17:30:15
修改时间:
2024-11-15 17:43:16
创建时间:
2025-11-11 15:35:35
更新时间:
2025-11-11 16:54:33
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2019-15253 2025-11-11 15:20:03 2025-11-11 07:35:35
NVD nvd_CVE-2019-15253 2025-11-11 14:56:31 2025-11-11 07:44:07
CNNVD cnnvd_CNNVD-202002-126 2025-11-11 15:10:21 2025-11-11 07:55:25
EXPLOITDB exploitdb_EDB-48459 2025-11-11 15:05:23 2025-11-11 08:54:33
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:54:33
references_count: 2 → 5; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 2 -> 5
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:55:25
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-202002-126; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 跨站脚本
  • cnnvd_id: 未提取 -> CNNVD-202002-126
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:07
affected_products_count: 2 → 3; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 2 -> 3
  • data_sources: ['cve'] -> ['cve', 'nvd']