TITLE: Cisco IOS CDP Status Page Script Insertion Vulnerability SECUNIA ADVISORY ID: SA18528 VERIFY ADVISORY: http://secunia.com/advisories/18528/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From local network OPERATING SYSTEM: Cisco IOS 11.x http://secunia.com/product/183/ DESCRIPTION: Digitalmunitions.com has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. The vulnerability is caused due to missing sanitisation of data received in CDP (Cisco Discovery Protocol) packets before displaying them in the CDP status page. This can be exploited to execute arbitrary HTML and JavaScript code in an Administrator's browser session in the context of the web administration interface when the status page is viewed. The vulnerability is related to: SA17780 The vulnerability has been reported in IOS 11.2(8.11)SA6. Other network devices running IOS 11 with the web administration server package installed may also be affected. SOLUTION: Update to Cisco IOS 12. Alternatively, disable CDP functionality if it is not required, or disable the web administration interface. PROVIDED AND/OR DISCOVERED BY: Digitalmunitions.com ORIGINAL ADVISORY: CISCO: http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml iDEFENSE: http://www.idefense.com/intelligence/vulnerabilities/display.php?id=372 OTHER REFERENCES: SA17780: http://secunia.com/advisories/17780/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------