A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an unauthenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
References
Configurations
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-ssrf-BJeQfpp - |
25 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-36 | |
References |
|
|
Information
Published : 2022-11-04 18:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20958
Mitre link : CVE-2022-20958
CVE.ORG link : CVE-2022-20958
JSON object : View
Products Affected
cisco
- broadworks_commpilot_application