安全研究

安全漏洞
Cisco ESA和Cisco Secure Email and Web Manager HTTP响应标头注入漏洞(CVE-2022-20772)

发布日期:2022-11-02
更新日期:2022-11-07

受影响系统:
Cisco Cisco Email Security Appliance
Cisco Cisco Secure Email and Web Manager
描述:
CVE(CAN) ID: CVE-2022-20772

Cisco Email Security Appliance是一个电子邮件安全设备。Cisco Web Security Appliance是一款Web安全设备。该设备提供基于SaaS的访问控制、实时网络报告和追踪、制定安全策略等功能。
Cisco ESA和Cisco Secure Email and Web Manager存在HTTP响应标头注入漏洞,该漏洞源于程序未能正确过滤输入值。未经身份认证的远程攻击者可利用该漏洞注入恶意HTTP标头、控制响应主体或将响应拆分为多个响应。

<*链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-HTTP-Inject-nvsyc
*>

建议:
厂商补丁:

Cisco
-----
Cisco已经为此发布了一个安全公告(cisco-sa-ESA-HTTP-Inject-nvsycUmR)以及相应补丁:
cisco-sa-ESA-HTTP-Inject-nvsycUmR:Cisco Email Security Appliance and Cisco Secure Email and Web Manager HTTP Response Header Injection Vulnerability
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ESA-HTTP-Inject-nvsycUmR

浏览次数:738
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障