All the vulnerabilites related to cisco - webex_meetings_server_2.7_mr2_patch
Vulnerability from fkie_nvd
Published
2017-07-25 19:29
Modified
2024-11-21 03:30
Severity ?
Summary
A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:webex_event_center:t30_base:*:*:*:*:*:*:*", "matchCriteriaId": "9B23ACCD-6784-4043-9AD1-AD1D9149D510", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_event_center:t31_base:*:*:*:*:*:*:*", "matchCriteriaId": "FB7E784F-423E-4ABB-AAC9-9CBBF3873702", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_event_center:t32_base:*:*:*:*:*:*:*", "matchCriteriaId": "35D6C33C-D91B-4C54-AA35-530293E43517", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meeting_center:t30_base:*:*:*:*:*:*:*", "matchCriteriaId": "1515E161-06AE-4A77-BA55-B04E0ECF05B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meeting_center:t31_base:*:*:*:*:*:*:*", "matchCriteriaId": "77A34A56-995C-456D-9F66-2D4510A8746A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meeting_center:t32_base:*:*:*:*:*:*:*", "matchCriteriaId": "FB819563-9DED-4339-BD3E-AB59E510EF52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings:t30_base:*:*:*:*:*:*:*", "matchCriteriaId": "1DE4DDB4-A4EA-48F4-ABAF-0E14CE903824", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:1.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "81E8E429-36B2-41A8-A483-8FD2E7044986", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:1.5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "48D31BB1-C7AF-4EB8-8234-97ABDA21D4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:1.5.1.131:*:*:*:*:*:*:*", "matchCriteriaId": "6DC55BEF-9FDD-49FA-AC8E-53467824AB24", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:1.5_base:*:*:*:*:*:*:*", "matchCriteriaId": "A7B8FEF2-8D03-4752-B829-E8694DCB850E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.0.1.107:*:*:*:*:*:*:*", "matchCriteriaId": "BB009CBA-0A3B-4578-BFC7-74C42CC3F107", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "80B9A3E8-DD9D-451B-81A4-BADA16512845", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D5C7BE43-0F81-4550-813E-66D0844E9291", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "9043AE98-9A13-46F8-8E8A-BEC9E8EE0843", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.5.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8289371-84B7-4342-9EA6-2844A9C5DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.5_base:*:*:*:*:*:*:*", "matchCriteriaId": "9F4AF5A4-1B99-43F8-A659-7C57B033F2A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8745FD6-B0B3-46A9-9254-7B13877D7080", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.6.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "794B669D-5A30-49CA-9F35-8F7AA5A2DF62", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "ABA0048F-B88D-47F6-89D6-B7EDDECBF700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.7_base:*:*:*:*:*:*:*", "matchCriteriaId": "30ECA8FE-D587-4692-AA90-9706E44BAC1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server:2.8_base:*:*:*:*:*:*:*", "matchCriteriaId": "04698E83-4906-4FD9-81C1-955A6D770898", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr2:*:*:*:*:*:*:*", "matchCriteriaId": "CE527118-BAFE-4120-890B-B6D3AFF91D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr3:*:*:*:*:*:*:*", "matchCriteriaId": "D1297660-D3BF-4EB4-9AD8-F0B6CB1D7EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr4:*:*:*:*:*:*:*", "matchCriteriaId": "633885BF-E4AD-4D68-BE6B-FC422C4A6756", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr5:*:*:*:*:*:*:*", "matchCriteriaId": "735D9391-9600-4488-A5A3-9BE519991C07", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr6:*:*:*:*:*:*:*", "matchCriteriaId": "596CF80A-6D04-4C8C-8E4C-A312F50F90CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr7:*:*:*:*:*:*:*", "matchCriteriaId": "26700488-AE40-4B51-9205-90B2822A1473", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr8:*:*:*:*:*:*:*", "matchCriteriaId": "64859732-7AD6-4393-927A-2D610746C6B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0:mr9:*:*:*:*:*:*:*", "matchCriteriaId": "5A173DA9-B4F4-4A1E-8A57-B7D04FAD775B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0_mr8_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "3DC24AAF-F4B6-45D6-9C62-09B104C72F83", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0_mr9_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "4ACAED8E-CD53-4F12-858E-3AB1DB652893", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0_mr9_patch:2:*:*:*:*:*:*:*", "matchCriteriaId": "396E0F99-BD66-4B77-BA1F-6CDC25BAD54C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.0_mr9_patch:3:*:*:*:*:*:*:*", "matchCriteriaId": "AE5EBC53-A135-429B-B132-B2FF8F6E2C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr1:*:*:*:*:*:*:*", "matchCriteriaId": "A0E2C39D-1B45-42D6-B09E-1E5FA258A776", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr2:*:*:*:*:*:*:*", "matchCriteriaId": "F7B02318-4867-43D4-9FB2-82A3CF59342E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr3:*:*:*:*:*:*:*", "matchCriteriaId": "CA32CA3D-7617-453A-9D1B-4BCD84017573", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr4:*:*:*:*:*:*:*", "matchCriteriaId": "4EE64939-BE95-454D-88C1-39A8E69A21D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr5:*:*:*:*:*:*:*", "matchCriteriaId": "571E071B-BF6D-4DC7-9E29-C150C18C2709", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5:mr6:*:*:*:*:*:*:*", "matchCriteriaId": "9A8E6509-E041-489C-A31E-BC4EAF5DEA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr2_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "D9A3B55D-840B-48CA-9A01-97F33C24E38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr5_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "E2715AB5-39A2-4AB4-8DBC-A0AF0E659DF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr6_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "478A42B0-27D5-4C01-B515-C09A5C87F49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr6_patch:2:*:*:*:*:*:*:*", "matchCriteriaId": "15D2AB6C-7C5D-44FD-9990-6EAD1CFCC10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr6_patch:3:*:*:*:*:*:*:*", "matchCriteriaId": "F63FD08C-2483-4F4D-BF90-4FC53AC51F11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.5_mr6_patch:4:*:*:*:*:*:*:*", "matchCriteriaId": "32D28387-E832-4EB5-BD0C-B64BBE42943B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6:mr1:*:*:*:*:*:*:*", "matchCriteriaId": "4C89D9D6-0923-4D11-A264-776AB637B007", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6:mr2:*:*:*:*:*:*:*", "matchCriteriaId": "A0CA8FDC-2040-44AC-B05D-D94F3387118E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6:mr3:*:*:*:*:*:*:*", "matchCriteriaId": "0FCAF0D6-372F-4230-A9FE-D76E6CDDBA3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6_mr1_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "1F0CBF03-2DC9-4C66-A324-F007D5C03429", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6_mr2_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "9C416484-9739-453F-A8F8-FB2A0AE3716D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6_mr3_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "7277467C-D605-496C-A666-520C7E8729CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.6_mr3_patch:2:*:*:*:*:*:*:*", "matchCriteriaId": "032142FE-89CD-4810-A6F2-890CD16E6333", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.7:mr1:*:*:*:*:*:*:*", "matchCriteriaId": "CECC6270-A8DC-4B51-9675-FF428E33790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.7:mr2:*:*:*:*:*:*:*", "matchCriteriaId": "C06C6985-D7A1-4146-BCAA-BA255F238172", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.7_mr1_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "3E33A813-6D07-447A-96A6-36E2B63FE799", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_meetings_server_2.7_mr2_patch:1:*:*:*:*:*:*:*", "matchCriteriaId": "D8284327-927C-406A-BAC6-B7EF21F47407", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_support_center:t30_base:*:*:*:*:*:*:*", "matchCriteriaId": "68F014B7-5DDB-48DC-ABF9-DA7BC081830F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_support_center:t31_base:*:*:*:*:*:*:*", "matchCriteriaId": "C2AAF51C-6E2A-465E-8AD9-9A170E9FC3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_support_center:t32_base:*:*:*:*:*:*:*", "matchCriteriaId": "305F6293-1231-419B-B096-6F88943806A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_training_center:t30_base:*:*:*:*:*:*:*", "matchCriteriaId": "ABAA1ECC-04D7-47EA-B457-818F5BA381AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_training_center:t31_base:*:*:*:*:*:*:*", "matchCriteriaId": "B3E501E7-912E-462C-BC4C-5C8E1C6425AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_training_center:t32_base:*:*:*:*:*:*:*", "matchCriteriaId": "ABB3EDE5-67C5-40E4-AB92-BBF1B8122091", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037." }, { "lang": "es", "value": "Una vulnerabilidad en las extensiones del navegador WebEx de Cisco para Google Chrome y Mozilla Firefox, podr\u00eda permitir que un atacante remoto no autenticado ejecute c\u00f3digo arbitrario con los privilegios del navegador afectado sobre un sistema afectado. Esta vulnerabilidad afecta a las extensiones del navegador para WebEx Meetings Server de Cisco, WebEx Centers de Cisco (Meeting Center, Event Center, Training Center y Support Center) y WebEx Meetings de Cisco cuando son ejecutadas en Microsoft Windows. Una vulnerabilidad es debido a un defecto de dise\u00f1o en la extensi\u00f3n. Un atacante que pueda convencer a un usuario afectado para visitar una p\u00e1gina web controlada por un atacante o siga un enlace provisto por un atacante con un navegador afectado podr\u00eda atacar esta vulnerabilidad. Si tiene \u00e9xito, el atacante podr\u00eda ejecutar c\u00f3digo arbitrario con privilegios del navegador afectado. Las siguientes versiones de las extensiones del navegador de WebEx de Cisco est\u00e1n afectadas: Versiones anteriores a 1.0.12 de la extensi\u00f3n WebEx de Cisco en Google Chrome, Versiones anteriores a 1.0.12 de la extensi\u00f3n WebEx de Cisco en Mozilla Firefox. Identificaci\u00f3n de Bug Cisco: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037." } ], "id": "CVE-2017-6753", "lastModified": "2024-11-21T03:30:27.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-25T19:29:00.397", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99614" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038909" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038910" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038911" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2017-6753
Vulnerability from cvelistv5
Published
2017-07-25 19:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038911 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/99614 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1038910 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1038909 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco WebEx Browser Extension |
Version: Cisco WebEx Browser Extension |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038911", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038911" }, { "name": "99614", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99614" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" }, { "name": "1038910", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038910" }, { "name": "1038909", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco WebEx Browser Extension", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco WebEx Browser Extension" } ] } ], "datePublic": "2017-07-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-26T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1038911", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038911" }, { "name": "99614", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99614" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" }, { "name": "1038910", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038910" }, { "name": "1038909", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038909" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco WebEx Browser Extension", "version": { "version_data": [ { "version_value": "Cisco WebEx Browser Extension" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "1038911", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038911" }, { "name": "99614", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99614" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex" }, { "name": "1038910", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038910" }, { "name": "1038909", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038909" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6753", "datePublished": "2017-07-25T19:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:41:17.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }