Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites.
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-05-06T16:35:16.452008Z

Updated: 2024-11-15T17:28:01.275Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3178

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.708Z

cve-icon NVD

Status : Modified

Published: 2020-05-06T17:15:11.853

Modified: 2024-11-21T05:30:29.420

Link: CVE-2020-3178

cve-icon Redhat

No data.