Eval injection vulnerability in the csco_wrap_js function in /+CSCOL+/cte.js in WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 allows remote attackers to bypass a DOM wrapper and conduct cross-site scripting (XSS) attacks by setting CSCO_WebVPN['process'] to the name of a crafted function, aka Bug ID CSCsy80694.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/35476 | vdb entry exploit |
https://www.trustwave.com/spiderlabs/advisories/TWSL2009-002.txt | |
http://www.securityfocus.com/archive/1/504516/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1022457 | vdb entry |
http://www.vupen.com/english/advisories/2009/1713 | vdb entry |
http://secunia.com/advisories/35511 | third party advisory |