First published: Thu Nov 30 2017(Updated: )
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf78635,, CSCvg52440.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco WebEx Meeting Center | =t32.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco WebEx Meeting Center vulnerability is CVE-2017-12366.
CVE-2017-12366 has a severity level of medium.
The vulnerability in Cisco WebEx Meeting Center occurs due to insufficient input validation of some parameters passed to the web server.
CVE-2017-12366 allows an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system.
You can find more information about CVE-2017-12366 on the following references: [SecurityFocus](http://www.securityfocus.com/bid/101984), [SecurityTracker](http://www.securitytracker.com/id/1039918), [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex5).