You are here

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability

December 17, 2012 - 1:00am

Addthis

PROBLEM:

Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability

PLATFORM:

Cisco Wireless LAN Controller (WLC)

ABSTRACT:

A vulnerability was reported in Cisco Wireless LAN Controller.

REFERENCE LINKS:

SecurityTracker Alert ID:  1027886
Secunia Advisory SA51546
CVE-2012-5991
CVE-2012-5992
CVE-2012-6007

IMPACT ASSESSMENT:

Medium

DISCUSSION:

A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks.

A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-6007]. The code will originate from the site running the Cisco Wireless LAN Controller software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user [CVE-2012-5992].

One action can cause the target device to reload [CVE-2012-5991].

IMPACT:

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Cisco Wireless LAN Controller software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

SOLUTION:

No official solution is currently available.

Addthis