First published: Wed Feb 03 2021(Updated: )
A vulnerability in the user interface of Cisco Webex Meetings and Cisco Webex Meetings Server Software could allow an authenticated, remote attacker to inject a hyperlink into a meeting invitation email. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by entering a URL into a field in the user interface. A successful exploit could allow the attacker to generate a Webex Meetings invitation email that contains a link to a destination of their choosing. Because this email is sent from a trusted source, the recipient may be more likely to click the link. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-linkinj-WWZpVqu9
Credit: Abhinav Khanna eSec Forte Technologies
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Webex Meetings Client | ||
Cisco WebEx Meetings Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability is considered high due to the potential for remote attackers to inject malicious hyperlinks.
To mitigate the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability, update to the latest version of Cisco Webex Meetings or the Cisco Webex Meetings Server Software as recommended by Cisco.
The cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability affects Cisco Webex Meetings Client and Cisco Webex Meetings Server Software.
Authenticated remote attackers can exploit the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability to inject malicious hyperlinks into meeting invitation emails.
The cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability facilitates phishing attacks by allowing an attacker to manipulate meeting invitation content.