First published: Thu Sep 05 2019(Updated: )
A vulnerability in Cisco Finesse could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on an affected system. The vulnerability exists because the affected system does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a user of the web application. A successful exploit could allow the attacker to access the system and perform unauthorized actions.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | =11.6\(1\) | |
Cisco Finesse | =12.0\(1\) | |
Cisco Finesse | =12.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12632 is a vulnerability in Cisco Finesse that allows an unauthenticated remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack.
The severity of CVE-2019-12632 is high with a CVSS score of 7.5.
CVE-2019-12632 works by exploiting the system's lack of proper validation of user-supplied input, allowing an attacker to bypass access controls and perform an SSRF attack.
Cisco Finesse versions 11.6(1), 12.0(1), and 12.5(1) are affected by CVE-2019-12632.
To fix CVE-2019-12632, Cisco recommends upgrading to a fixed software release.