The vulnerability is due to lack of proper input validation of the HTTP URL being requested. An attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted device. An exploit could allow the attacker to view confidential information that should only be visible to authenticated users to the device. The attacker could use this information to conduct additional reconnaissance attacks.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2iBwWko
The vulnerability is due to lack of proper input validation of the HTTP URL being requested. An attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted device. An exploit could allow the attacker to view confidential information that should only be visible to authenticated users to the device. The attacker could use this information to conduct additional reconnaissance attacks.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2iBwWko
Security Impact Rating: Medium
CVE: CVE-2017-3805
from Cisco Security Advisory http://ift.tt/2iBwWko
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.