PT-2011-27: Multiple Vulnerabilities in Cisco ACS Web Interface
Version: 22.214.171.124 and earlier, 126.96.36.199 and earlier
Severity level: Medium
Impact: Cross-Site Scripting
Access Vector: Network exploitable
Base Score: 4.3
Cisco Secure Access Control Server (ACS) is an access policy control platform.
Positive Research Center has discovered multiple vulnerabilities in the Cisco ACS web interface.
Cross-site scripting vulnerabilities are triggered when a specially crafted value is assigned to different variables in scripts, which allows one to manage device through Web-interface. This can be exploited to inject malicious code and execute arbitrary HTML or script code in the admin browser session in the context of the device's web management interface.
The details are not disclosed by agreement with the Cisco company.
How to fix
We recommend that you download the latest cumulative patch. The patches for users with service contracts are available through their regular update channels (in most cases, through the Software Center on Cisco's worldwide website at http://www.cisco.com).
Users whose Cisco products are provided or maintained through agreements with third-party support organizations should contact that support organization for guidance and assistance.
Fixed software can also be obtained via the Cisco Technical Assistance Center (TAC). Refer to http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information.
28.07.2011 - Vendor is notified
28.07.2011 - Vendor gets vulnerability details
13.02.2012 - Vendor releases fixed version and details
20.02.2012 - Public disclosure
These vulnerabilities were discovered by Maxim Tsoy, Yuriy Goltsev, Alexander Zaitsev, and Evgeniy Tolmachev, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: