vendor:
TelePresence Series
by:
Sense of Security
3.3
CVSS
LOW
Post-authentication HTML Injection, Post-authentication Cross-site Scripting, Post-authentication Cross-site Request Forgery
N/A
CWE
Product Name: TelePresence Series
Affected Version From: C <= TC4.1.2, MXP <= F9.1
Affected Version To: C <= TC4.1.2, MXP <= F9.1
Patch Exists: YES
Related CWE: CVE-2011-2544, CVE-2011-2543, CVE-2011-2577
CPE: N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Cisco
2011
Sense of Security – Security Advisory – SOS-11-010
Cisco TelePresence Endpoints have a web interface (HTTP or HTTPS) for managing, configuring and reporting. It is possible to set the Call ID (with H.323 or SIP) to a HTML/JavaScript/URL value. If a call is made to another endpoint and an authenticated user browses to the web interface on the endpoint receiving the call (e.g. to view call statistics), the HTML/JavaScript/URL will render locally within the context of the logged in user. From this point it is possible to make changes to the system as the authenticated user. The flaw is due to the flexibility of the H.323 ID or SIP Display Name fields and failure to correctly validate user input.
Mitigation:
Cisco has released a patch for this vulnerability.