Cisco Secure Client Carriage Return Line Feed Injection Vulnerability
|
System information
|
|
|
Affected software |
Cisco |
Description
|
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or
More info:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-client-crlf-W43V4G7?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Secure%20Client%20Carriage%20Return%20Line%20Feed%20Injection%20Vulnerability&vs_k=1 |
Standar resources
|
Property |
Value |
CVE |
CVE-2024-20337. |