CVE-2020-3117

A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:content_security_management_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*
cpe:2.3:a:cisco:web_security_appliance:12.0.1-268:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-23 01:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-3117

Mitre link : CVE-2020-3117

CVE.ORG link : CVE-2020-3117


JSON object : View

Products Affected

cisco

  • content_security_management_appliance
  • web_security_appliance
CWE
NVD-CWE-Other CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')