First published: Wed Jun 06 2018(Updated: )
A vulnerability in the web framework of Cisco WebEx could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user’s browser in the context of an affected site. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss
Credit: Adam Willard.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180606-webex-xss is classified as a high risk due to its potential for exploitation via a cross-site scripting attack.
To fix cisco-sa-20180606-webex-xss, update your Cisco WebEx software to the latest version that addresses this vulnerability.
Users of the Cisco WebEx platform are affected by the cisco-sa-20180606-webex-xss vulnerability.
cisco-sa-20180606-webex-xss is a cross-site scripting (XSS) vulnerability.
Yes, cisco-sa-20180606-webex-xss can be exploited by an unauthenticated, remote attacker.