First published: Wed Jun 06 2018(Updated: )
A vulnerability in the web framework of the https://try.webex.com page of Cisco WebEx could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user’s browser in the context of an affected site. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-webex-xss1
Credit: Daniel Diez Tainta.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180606-webex-xss1 is rated as high due to the potential impact of cross-site scripting (XSS) attacks.
To mitigate cisco-sa-20180606-webex-xss1, ensure that you are using the latest version of Cisco WebEx platform where the vulnerability has been addressed.
Users of the Cisco WebEx platform, particularly those accessing the https://try.webex.com page, are affected by cisco-sa-20180606-webex-xss1.
cisco-sa-20180606-webex-xss1 is associated with cross-site scripting (XSS) attacks that can compromise user data and session information.
No, an unauthenticated remote attacker can exploit cisco-sa-20180606-webex-xss1, making it particularly dangerous.