Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gq6-x7pv-3ggr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing.

Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing.

EPSS

Процентиль: 32%
0.00125
Низкий

Связанные уязвимости

CVSS3: 3.1
nvd
почти 6 лет назад

Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing.

CVSS3: 3.1
fstec
больше 6 лет назад

Уязвимость программного обеспечения для веб-конференцсвязи Cisco WebEx Business Suite, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 32%
0.00125
Низкий