First published: Wed Oct 03 2018(Updated: )
A vulnerability in the web-based management interface of Cisco Webex Events Center, Cisco Webex Meeting Center, Cisco Webex Support Center, and Cisco Webex Training Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-xss
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Events Center | ||
Cisco WebEx Meeting Center | ||
Cisco Webex Support Center | ||
Cisco WebEx Training Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181003-webex-xss is considered high due to its potential for cross-site scripting attacks.
To fix cisco-sa-20181003-webex-xss, users should apply the latest security patches provided by Cisco for the affected Webex products.
The affected products include Cisco Webex Events Center, Meeting Center, Support Center, and Training Center.
Yes, cisco-sa-20181003-webex-xss can be exploited remotely by an unauthenticated attacker.
cisco-sa-20181003-webex-xss facilitates cross-site scripting (XSS) attacks against users of the affected Webex products.