Cisco Unified MeetingPlace Login Screen Cross-Site Scripting Vulnerability
Cisco-SA-20071107-CVE-2007-5581 · Medium · Published · Updated
Cisco Unified MeetingPlace versions 5.3.235.0 and prior, 5.4, and 6.0 contain a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to insufficient filtering of parameters passed to the Login form of Cisco Unified MeetingPlace. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to follow a URL containing malicious parameters. When followed, the link could cause the affected site to return attacker-supplied script code to the affected user within the security context of the affected site. This could allow the attacker to execute arbitrary script code or HTML within a user's browser session. This could allow the attacker to gain access to sensitive browser information related to the affected site. Cisco has confirmed this vulnerability in a security response and released updated software. To exploit this vulnerability, an attacker must convince a user to follow a malicious URL, likely provided within an e-mail message or other form of messaging. An exploit could allow the attacker to execute arbitrary script code in the user's browser session within the Cisco Unified MeetingPlace application. An exploit could allow the attacker to gain access to sensitive browser-based information or possibly take actions on the affected site as the user. Because the affected login form is often deployed to facilitate remote web meetings between customers and the organization's deploying meeting place, it may be trivial for an attacker to convince a user of these systems to follow a crafted link. However, due to the nature of the application, the types of information an attacker may be able to disclose are limited in nature and are unlikely to pose a serious threat if disclosed. The Cisco Security Response has been updated with an additional bug ID and technical information, and additional updated software has been released. Administrators are advised to implement the fixes provided for both bug IDs to fully resolve this vulnerability.
Workarounds
Administrators are advised to apply the appropriate updates.
Users are advised not to visit untrusted websites.
Users are advised not to open e-mail from untrusted sources.
Users are advised not to follow unsolicited links. Users should verify the authenticity of an unexpected link from a trusted source prior to following it.
The following document from the Cisco Applied Intelligence team can guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software:
Understanding Cross-Site Scripting (XSS) Threat Vectorshttp://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20060922-understanding-xss
| CVEs | CVE-2007-5581 |
|---|---|
| Cisco Bug IDs | NA |
| CVSS Score | Base 4.3 Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C/CDP:N/TD:N/CR:ND/IR:ND/AR:ND |
| Product Names From Source | Cisco Unified MeetingPlace |
Related Products
| Product | CVE | Evidence |
|---|