{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-20228","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2022-10-27T18:47:50.369Z","datePublished":"2023-08-16T20:59:07.910Z","dateUpdated":"2024-08-02T09:05:35.864Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-01-25T16:58:25.643Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."}],"affected":[{"vendor":"Cisco","product":"Cisco Identity Services Engine Software","versions":[{"version":"N/A","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Unified Computing System (Standalone)","versions":[{"version":"3.1(1d)","status":"affected"},{"version":"3.1(2b)","status":"affected"},{"version":"3.1(2c)","status":"affected"},{"version":"3.1(2d)","status":"affected"},{"version":"3.1(2e)","status":"affected"},{"version":"3.1(2g)","status":"affected"},{"version":"3.1(2i)","status":"affected"},{"version":"3.1(3a)","status":"affected"},{"version":"3.1(3b)","status":"affected"},{"version":"3.1(3c)","status":"affected"},{"version":"3.1(3d)","status":"affected"},{"version":"3.1(3g)","status":"affected"},{"version":"3.1(3h)","status":"affected"},{"version":"3.1(3i)","status":"affected"},{"version":"3.1(3j)","status":"affected"},{"version":"3.1(3k)","status":"affected"},{"version":"4.0(1.240)","status":"affected"},{"version":"4.0(1a)","status":"affected"},{"version":"4.0(1b)","status":"affected"},{"version":"4.0(1c)","status":"affected"},{"version":"4.0(1d)","status":"affected"},{"version":"4.0(1e)","status":"affected"},{"version":"4.0(1g)","status":"affected"},{"version":"4.0(1h)","status":"affected"},{"version":"4.0(2c)","status":"affected"},{"version":"4.0(2d)","status":"affected"},{"version":"4.0(2f)","status":"affected"},{"version":"4.0(2g)","status":"affected"},{"version":"4.0(2h)","status":"affected"},{"version":"4.0(2i)","status":"affected"},{"version":"4.0(2l)","status":"affected"},{"version":"4.0(2n)","status":"affected"},{"version":"4.0(4b)","status":"affected"},{"version":"4.0(4c)","status":"affected"},{"version":"4.0(4d)","status":"affected"},{"version":"4.0(4e)","status":"affected"},{"version":"4.0(4f)","status":"affected"},{"version":"4.0(4h)","status":"affected"},{"version":"4.0(4i)","status":"affected"},{"version":"4.0(4k)","status":"affected"},{"version":"4.0(4l)","status":"affected"},{"version":"4.0(4m)","status":"affected"},{"version":"4.0(2o)","status":"affected"},{"version":"4.0(2p)","status":"affected"},{"version":"4.0(4n)","status":"affected"},{"version":"4.0(2q)","status":"affected"},{"version":"4.0(2r)","status":"affected"},{"version":"4.1(1c)","status":"affected"},{"version":"4.1(1d)","status":"affected"},{"version":"4.1(1f)","status":"affected"},{"version":"4.1(1g)","status":"affected"},{"version":"4.1(2a)","status":"affected"},{"version":"4.1(1h)","status":"affected"},{"version":"4.1(2b)","status":"affected"},{"version":"4.1(2f)","status":"affected"},{"version":"4.1(2e)","status":"affected"},{"version":"4.1(3b)","status":"affected"},{"version":"4.1(2d)","status":"affected"},{"version":"4.1(3c)","status":"affected"},{"version":"4.1(3d)","status":"affected"},{"version":"4.1(2g)","status":"affected"},{"version":"4.1(3f)","status":"affected"},{"version":"4.1(2h)","status":"affected"},{"version":"4.1(2j)","status":"affected"},{"version":"4.1(2k)","status":"affected"},{"version":"4.1(2l)","status":"affected"},{"version":"4.1(3h)","status":"affected"},{"version":"4.1(3i)","status":"affected"},{"version":"4.1(3l)","status":"affected"},{"version":"4.2(1a)","status":"affected"},{"version":"4.2(1b)","status":"affected"},{"version":"4.2(1c)","status":"affected"},{"version":"4.2(1e)","status":"affected"},{"version":"4.2(1f)","status":"affected"},{"version":"4.2(1g)","status":"affected"},{"version":"4.2(1i)","status":"affected"},{"version":"4.2(1j)","status":"affected"},{"version":"4.2(2a)","status":"affected"},{"version":"4.2(2f)","status":"affected"},{"version":"4.2(2g)","status":"affected"},{"version":"4.2(3b)","status":"affected"},{"version":"4.2(3d)","status":"affected"},{"version":"4.2(3e)","status":"affected"},{"version":"4.3(1.230097)","status":"affected"},{"version":"4.3(1.230124)","status":"affected"},{"version":"4.3(1.230138)","status":"affected"}]},{"vendor":"Cisco","product":"Cisco Unified Computing System E-Series Software (UCSE)","versions":[{"version":"2.1.0","status":"affected"},{"version":"2.4.0","status":"affected"},{"version":"2.4.1","status":"affected"},{"version":"2.4.2","status":"affected"},{"version":"3.2.1","status":"affected"},{"version":"3.2.2","status":"affected"},{"version":"3.2.3","status":"affected"},{"version":"3.2.4","status":"affected"},{"version":"3.2.6","status":"affected"},{"version":"3.2.7","status":"affected"},{"version":"3.2.10","status":"affected"},{"version":"3.2.11.1","status":"affected"},{"version":"3.2.8","status":"affected"},{"version":"3.2.11.3","status":"affected"},{"version":"3.2.11.5","status":"affected"},{"version":"3.2.12.2","status":"affected"},{"version":"3.2.13.6","status":"affected"},{"version":"3.2.14","status":"affected"},{"version":"3.1.1","status":"affected"},{"version":"3.1.2","status":"affected"},{"version":"3.1.3","status":"affected"},{"version":"3.1.4","status":"affected"},{"version":"3.1.5","status":"affected"},{"version":"3.1.0","status":"affected"},{"version":"3.0.1","status":"affected"},{"version":"3.0.2","status":"affected"},{"version":"2.3.1","status":"affected"},{"version":"2.3.2","status":"affected"},{"version":"2.3.3","status":"affected"},{"version":"2.3.5","status":"affected"},{"version":"2.2.1","status":"affected"},{"version":"2.2.2","status":"affected"},{"version":"2.0.0","status":"affected"},{"version":"2.10","status":"affected"},{"version":"3.06","status":"affected"},{"version":"3.02","status":"affected"},{"version":"4.11.1","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)","type":"cwe","cweId":"CWE-80"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-UMYtYEtr","name":"cisco-sa-cimc-xss-UMYtYEtr"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-cimc-xss-UMYtYEtr","discovery":"EXTERNAL","defects":["CSCwe96259","CSCwf98681","CSCwh65092"]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:05:35.864Z"},"title":"CVE Program Container","references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-UMYtYEtr","name":"cisco-sa-cimc-xss-UMYtYEtr","tags":["x_transferred"]}]}]}}