CVE-2019-1702

Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker's code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:enterprise_chat_and_email:11.6\(1\):*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/107314 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107314 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss - Vendor Advisory

Information

Published : 2019-03-11 21:29

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1702

Mitre link : CVE-2019-1702

CVE.ORG link : CVE-2019-1702


JSON object : View

Products Affected

cisco

  • enterprise_chat_and_email
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')