First published: Thu Jun 07 2018(Updated: )
A vulnerability in the web framework of Cisco WebEx could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Cisco Bug IDs: CSCvi63757.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings | =t32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0356 is a vulnerability in the web framework of Cisco WebEx that allows an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack.
CVE-2018-0356 has a severity rating of medium with a CVSS score of 6.1.
Cisco Webex Meetings version t32 is affected by CVE-2018-0356.
An unauthenticated remote attacker can exploit CVE-2018-0356 by conducting a cross-site scripting (XSS) attack against the user of the web interface of an affected system.
Yes, you can find more information about CVE-2018-0356 at the following references: http://www.securityfocus.com/bid/104421, http://www.securitytracker.com/id/1041062, https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss.