Release date:
Updated on: 2012-05-10
Affected Systems:
Cisco Secure ACS 5.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53436
Cve id: CVE-2011-3293, CVE-2011-3317
Cisco Secure ACS is a central RADIUS and TACACS + server that integrates user authentication, user and administrator device access control, and policy control into a centralized unified network solution.
Cisco Secure Access Control System 5.2.0.26 patch 9 and earlier versions have multiple vulnerabilities. Malicious users can exploit this vulnerability to execute script insertion, cross-site request forgery, and SQL injection attacks.
1) The application allows users to provide HTTP requests to perform certain operations without verifying the validity of these requests.
2) some inputs are used if they are not properly filtered. They can be inserted and executed in user browser sessions to execute arbitrary HTML and script code.
3) Some inputs are used in SQL queries if they are not properly filtered. You can use SQL code to perform SQL queries.
<* Source: vendor
Link: http://secunia.com/advisories/49101/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Cisco
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.cisco.com/warp/public/707/advisory.html