A vulnerability in Cisco Jabber Client Framework (JCF) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system.
The vulnerability is due to insufficient validation of user-supplied input of an affected client. An attacker could exploit this vulnerability by executing arbitrary JavaScript in the Jabber client of the recipient. A successful exploit could allow the attacker to execute arbitrary script code in the context of the targeted client or allow the attacker to access sensitive client-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-jcf-im-xss [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-jcf-im-xss”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_jabber_im_for_android | any | cpe:2.3:a:cisco:cisco_jabber_im_for_android:any:*:*:*:*:*:*:* |
cisco | cisco_jabber_for_windows | any | cpe:2.3:a:cisco:cisco_jabber_for_windows:any:*:*:*:*:*:*:* |
cisco | jabber_guest | any | cpe:2.3:a:cisco:jabber_guest:any:*:*:*:*:*:*:* |
cisco | telepresence_video_communication_servers | any | cpe:2.3:h:cisco:telepresence_video_communication_servers:any:*:*:*:*:*:*:* |
cisco | jabber_software_development_kit | any | cpe:2.3:a:cisco:jabber_software_development_kit:any:*:*:*:*:*:*:* |
cisco | cisco_jabber_for_mac | any | cpe:2.3:a:cisco:cisco_jabber_for_mac:any:*:*:*:*:*:*:* |
cisco | cisco_jabber_for_ios | any | cpe:2.3:a:cisco:cisco_jabber_for_ios:any:*:*:*:*:*:*:* |
cisco | jabber | any | cpe:2.3:a:cisco:jabber:any:*:*:*:*:*:*:* |