First published: Sat May 22 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | <=12.6\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1358 is medium, with a severity value of 6.1.
CVE-2021-1358 allows an unauthenticated, remote attacker to redirect a user to an undesired web page through the web-based management interface of Cisco Finesse.
CVE-2021-1358 is caused by improper input validation of the URL parameters in an HTTP request sent to an affected Cisco Finesse system.
No, authentication is not required to exploit CVE-2021-1358.
To mitigate CVE-2021-1358, Cisco recommends applying the relevant software update as described in the Cisco Security Advisory.