First published: Thu Jun 07 2018(Updated: )
A vulnerability in the web framework of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Cisco Bug IDs: CSCvf76417.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0354 is medium with a CVSS score of 6.1.
CVE-2018-0354 allows an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of Cisco Unity Connection.
Cisco Unity Connection version 12.5 is affected by CVE-2018-0354.
To fix CVE-2018-0354, apply the necessary security patches provided by Cisco.
CVE-2018-0354 is associated with two CWE IDs: CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-20 (Improper Input Validation).