Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

<p>A vulnerability in the web applications of Cisco&nbsp;UCS Director could allow an authenticated, remote attacker to <span class=”TextRun Highlight SCXO16456276 BCX2″><span class=”NormalTextRun SCXO16456276 BCX2″>conduct a cross-site scripting attack on an affected system.</span></span></p>
<p>This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7″ target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20765

Related:

  • No Related Posts

Leave a Reply