Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-3384


The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.


Published

2013-06-27T21:55:07.023

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ironport_asyncos ≤ 7.1.3 Yes
Operating System cisco ironport_asyncos 7.2 Yes
Operating System cisco ironport_asyncos 7.3 Yes
Operating System cisco ironport_asyncos 7.5 Yes
Operating System cisco ironport_asyncos 7.6 Yes
Operating System cisco ironport_asyncos 7.7 Yes
Operating System cisco ironport_asyncos 7.8 Yes
Operating System cisco ironport_asyncos 7.9 Yes
Hardware cisco content_security_management - No
Hardware cisco web_security_appliance - No
Operating System cisco email_security_appliance_firmware - No

References