First published: Thu May 17 2018(Updated: )
A vulnerability in the web framework of Cisco Unified Communications Manager and Cisco Unified Presence could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Cisco Bug IDs: CSCvg89116.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =10.5\(2.10000.5\) | |
Cisco Unified Communications Manager | =11.0\(1.10000.10\) | |
Cisco Unified Communications Manager | =11.5\(1.10000.6\) | |
Cisco Unified Communications Manager | =12.0\(1.10000.10\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0328 is classified as a high severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To resolve CVE-2018-0328, you should apply the security patches provided by Cisco for the affected versions of Unified Communications Manager.
CVE-2018-0328 affects users of Cisco Unified Communications Manager and Cisco Unified Presence running specific vulnerable versions.
CVE-2018-0328 allows unauthenticated remote attackers to exploit the vulnerability, meaning no prior authentication is necessary.
CVE-2018-0328 is associated with cross-site scripting (XSS) attacks, which can lead to session hijacking or information theft.