First published: Wed Jul 18 2018(Updated: )
A vulnerability in the web framework of Cisco Webex could allow an unauthenticated, remote attacker to conduct a Document Object Model-based (DOM-based) cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software by using the HTTP POST method. An attacker who can submit malicious scripts to the affected user interface element could execute arbitrary script or HTML code in the user’s browser in the context of the affected site. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-DOM-xss
Credit: Gabriele Pippi.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180718-webex-DOM-xss is considered high due to the potential for unauthorized remote code execution.
To mitigate cisco-sa-20180718-webex-DOM-xss, ensure your Cisco Webex platform is updated to the latest version with applied security patches.
Cisco Webex users accessing the web interface are potentially affected by the cisco-sa-20180718-webex-DOM-xss vulnerability.
cisco-sa-20180718-webex-DOM-xss is associated with a Document Object Model-based (DOM-based) cross-site scripting (XSS) attack.
Yes, cisco-sa-20180718-webex-DOM-xss can be exploited by an unauthenticated remote attacker.