A vulnerability in the Clientless SSL VPN (WebVPN)...
Moderate severity
Unreviewed
Published
Aug 11, 2022
to the GitHub Advisory Database
•
Updated Nov 1, 2023
Description
Published by the National Vulnerability Database
Aug 10, 2022
Published to the GitHub Advisory Database
Aug 11, 2022
Last updated
Nov 1, 2023
A vulnerability in the Clientless SSL VPN (WebVPN) component of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks. This vulnerability is due to improper validation of input that is passed to the Clientless SSL VPN component. An attacker could exploit this vulnerability by convincing a targeted user to visit a website that can pass malicious requests to an ASA device that has the Clientless SSL VPN feature enabled. A successful exploit could allow the attacker to conduct browser-based attacks, including cross-site scripting attacks, against the targeted user.
References