First published: Tue Dec 23 2014(Updated: )
The API in the Guest Server in Cisco Jabber, when the HTML5 CORS feature is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST request, aka Bug ID CSCus19789.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Jabber |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8024 is classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To mitigate CVE-2014-8024, ensure that proper network security measures, such as encryption and secure connections, are in place.
CVE-2014-8024 allows attackers to sniff network traffic during HTTP GET or POST requests to obtain sensitive information.
CVE-2014-8024 affects all versions of Cisco Jabber Guest that utilize the HTML5 CORS feature.
CVE-2014-8024 is specifically associated with the Cisco Jabber Guest application.