First published: Wed Feb 06 2019(Updated: )
A vulnerability in Cisco Webex Meetings Online could allow an unauthenticated, remote attacker to inject arbitrary text into a user’s browser. The vulnerability is due to improper validation of input. An attacker could exploit this vulnerability by convincing a targeted user to view a malicious URL. A successful exploit could allow the attacker to inject arbitrary text into the user’s browser. The attacker could use the content injection to conduct spoofing attacks. Cisco has released software updates to address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-injection
Credit: Prasenjit Kanti Paul.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190206-webex-injection is classified as high due to the potential for remote code execution.
To fix cisco-sa-20190206-webex-injection, ensure that you are using the latest version of Cisco Webex Meetings Online.
The risks associated with cisco-sa-20190206-webex-injection include the potential for an attacker to inject arbitrary text into a user's browser, leading to phishing or malware downloads.
Users of Cisco Webex Meetings Online are affected by cisco-sa-20190206-webex-injection.
cisco-sa-20190206-webex-injection requires an attacker to convince a targeted user to view malicious content.