Vulnerability Details : CVE-2013-5505
Cross-site scripting (XSS) vulnerability in an administration page in Cisco Identity Services Engine (ISE) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCui30275.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2013-5505
- cpe:2.3:a:cisco:identity_services_engine_software:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-5505
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-5505
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-5505
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5505
-
http://secunia.com/advisories/54626
Sign inVendor Advisory
-
http://www.securitytracker.com/id/1029111
Cisco Identity Services Engine Administration Interface Input Validation Flaw Permits Cross-Site Scripting Attacks - SecurityTracker
-
http://osvdb.org/97875
-
http://www.securityfocus.com/bid/62693
Cisco Identity Services Engine CVE-2013-5505 Cross Site Scripting Vulnerability
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5505
Cisco Identity Services Engine Administration Interface Cross-Site Scripting VulnerabilityVendor Advisory
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=31008
Cisco Identity Services Engine Administration Interface Cross-Site Scripting VulnerabilityVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/87530
Cisco Identity Services Engine administration page cross-site scripting CVE-2013-5505 Vulnerability Report
Jump to