Executive Summary

Informations
Name CVE-2006-3073 First vendor Publication 2006-06-19
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site scripting (XSS) vulnerabilities in the WebVPN feature in the Cisco VPN 3000 Series Concentrators and Cisco ASA 5500 Series Adaptive Security Appliances (ASA), when in WebVPN clientless mode, allow remote attackers to inject arbitrary web script or HTML via the domain parameter in (1) dnserror.html and (2) connecterror.html, aka bugid CSCsd81095 (VPN3k) and CSCse48193 (ASA). NOTE: the vendor states that "WebVPN full-network-access mode" is not affected, despite the claims by the original researcher.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3073

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 3
Os 35

Open Source Vulnerability Database (OSVDB)

Id Description
26454 Cisco WebVPN Clientless Mode connecterror.html XSS

Cisco WebVPN and ASA contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the domain variable upon submission to the connecterror.html script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
26453 Cisco WebVPN Clientless Mode dnserror.html domain Parameter XSS

Cisco WebVPN contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the domain variable upon submission to the dnserror.html script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Sources (Detail)

http://secunia.com/advisories/20644
http://securitytracker.com/id?1016252
http://www.cisco.com/warp/public/707/cisco-sr-20060613-webvpn-xss.shtml
http://www.osvdb.org/26453
http://www.osvdb.org/26454
http://www.securityfocus.com/archive/1/436479/30/0/threaded
http://www.securityfocus.com/bid/18419
http://www.vupen.com/english/advisories/2006/2331
https://exchange.xforce.ibmcloud.com/vulnerabilities/27086
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:20:14
  • Multiple Updates
2024-11-28 12:09:13
  • Multiple Updates
2021-05-04 12:04:11
  • Multiple Updates
2021-04-22 01:04:49
  • Multiple Updates
2020-05-23 00:17:57
  • Multiple Updates
2018-10-31 00:19:46
  • Multiple Updates
2017-07-20 09:23:41
  • Multiple Updates
2016-06-28 15:49:58
  • Multiple Updates
2016-04-26 14:45:38
  • Multiple Updates
2013-05-11 11:00:45
  • Multiple Updates