First published: Wed Jan 23 2019(Updated: )
A vulnerability in the chat feed feature of Cisco SocialMiner could allow an unauthenticated, remote attacker to perform cross-site scripting (XSS) attacks against a user of the web-based user interface of an affected system. This vulnerability is due to insufficient sanitization of user-supplied input delivered to the chat feed as part of an HTTP request. An attacker could exploit this vulnerability by persuading a user to follow a link to attacker-controlled content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SocialMiner | =11.6\(1\) | |
Cisco SocialMiner | =11.6\(2\) | |
Cisco SocialMiner | =12.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1668.
The severity of CVE-2019-1668 is medium with a severity value of 6.1.
The affected software for CVE-2019-1668 is Cisco SocialMiner versions 11.6(1), 11.6(2), and 12.0(1).
CVE-2019-1668 is a vulnerability in the chat feed feature of Cisco SocialMiner that could allow an unauthenticated remote attacker to perform cross-site scripting (XSS) attacks against a user of the web-based user interface.
To fix CVE-2019-1668, Cisco has released software updates that address the vulnerability. It is recommended to update to the latest version of Cisco SocialMiner.