Cisco Unified Interaction Manager Cross-Site Scripting Vulnerability

Cisco-SA-20150818-CVE-2015-6255 · Medium · Published · Updated

A vulnerability in the web chat interface of Cisco Unified Interaction Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the chat on the affected system. The vulnerability is due to insufficient input validation of user-supplied input. An attacker could exploit this vulnerability by crafting a malicious chat message. Cisco has confirmed the vulnerability and released software updates. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available. Cisco would like to thank Jakub Kaluzny of Securing.pl for reporting this vulnerability.

Workarounds

Administrators are advised to apply the appropriate updates.

Users should verify that unsolicited links are safe to follow.

For additional information about XSS attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectorshttp://www.cisco.com/c/en/us/support/docs/cmb/cisco-amb-20060922-understanding-xss.html .

Administrators are advised to monitor affected systems.

CVEsCVE-2015-6255
Cisco Bug IDsCSCuo89051 , CSCuq05830
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C

Public Affected Products