Vigil@nce - Cisco ESA, SMA, WSA: Cross Site Request Forgery
September 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery of Cisco ESA,
SMA and WSA, in order to force the victim to perform operations.
Impacted products: Cisco Content SMA, Cisco ESA, IronPort Email,
IronPort Management, IronPort Web, Cisco WSA
Severity: 2/4
Creation date: 27/08/2013
DESCRIPTION OF THE VULNERABILITY
The Cisco Email Security Appliance, Cisco Content Security
Management Appliance and Cisco Web Security Appliance products
offer a web service.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery of
Cisco ESA, SMA and WSA, in order to force the victim to perform
operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cisco-ESA-SMA-WSA-Cross-Site-Request-Forgery-13317