4.3
CVSSv2

CVE-2017-6776

Published: 17/08/2017 Updated: 25/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in the web framework of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote malicious user to conduct a cross-site scripting (XSS) attack against a user of the web interface. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by convincing a user to access a malicious link or by intercepting a user request and injecting malicious code into the request. An exploit could allow the malicious user to execute arbitrary script code in the context of the affected site or allow the malicious user to access sensitive browser-based information. Cisco Bug IDs: CSCvd76324. Known Affected Releases: 2.2(9.76) and 2.3(1).

Vulnerable Product Search on Vulmon Subscribe to Product

cisco elastic services controller 2.3\\(1\\)

cisco elastic services controller 2.2\\(9.76\\)

Vendor Advisories

A vulnerability in the web framework of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface The vulnerability is due to insufficient validation of user-supplied input by the affected software An attacker could exploit this vulne ...