First published: Wed Jan 09 2019(Updated: )
A vulnerability in the MyWebex component of Cisco Webex Business Suite could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by convincing a user to click a crafted URL. To exploit this vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-webex-bs-xss
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Business Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20190109-webex-bs-xss vulnerability is classified as a medium severity XSS vulnerability.
To fix cisco-sa-20190109-webex-bs-xss, it is recommended to apply the latest patches provided by Cisco for the Webex Business Suite.
The cisco-sa-20190109-webex-bs-xss vulnerability affects users of the Cisco Webex Business Suite.
The cisco-sa-20190109-webex-bs-xss allows an attacker to conduct a cross-site scripting (XSS) attack.
No, an unauthenticated, remote attacker can exploit the cisco-sa-20190109-webex-bs-xss vulnerability.