CVE-2017-12321 (CNNVD-201711-663)

MEDIUM
中文标题:
Cisco Registered Envelope Service 跨站脚本漏洞
英文标题:
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-base...
CVSS分数: 6.1
发布时间: 2017-11-16 07:00:00
漏洞类型: 跨站脚本
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Registered Envelope Service是美国思科(Cisco)公司的一套邮件服务解决方案。该产品包括邮件的读取回执、邮件回收、邮件转发和回复功能,并提供智能手机支持。 Cisco Registered Envelope Service中的Web界面存在跨站脚本漏洞,该漏洞源于程序没有充分的验证用户提交的输入。远程攻击者可通过诱使用户点击恶意链接或发送HTTP请求利用该漏洞在受影响系统Web界面上下文中执行任意的脚本代码或访问基于浏览器的敏感信息。

英文描述:

Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999.

CWE类型:
CWE-79
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco registered_envelope_service - - - cpe:2.3:a:cisco:registered_envelope_service:-:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
101863 vdb-entry
cve.org
访问
CVSS评分详情
6.1
MEDIUM
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS版本: 3.0
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2017-11-16 07:00:00
修改时间:
2024-08-05 18:36:56
创建时间:
2025-11-11 15:34:33
更新时间:
2025-11-11 15:53:25
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2017-12321 2025-11-11 15:19:17 2025-11-11 07:34:33
NVD nvd_CVE-2017-12321 2025-11-11 14:55:33 2025-11-11 07:43:12
CNNVD cnnvd_CNNVD-201711-663 2025-11-11 15:09:55 2025-11-11 07:53:25
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:25
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-201711-663; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 跨站脚本
  • cnnvd_id: 未提取 -> CNNVD-201711-663
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:12
cvss_score: 未提取 → 6.1; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 1; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 6.1
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 1
  • data_sources: ['cve'] -> ['cve', 'nvd']