exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco WebEx Meetings Server XML Injection

Cisco WebEx Meetings Server XML Injection
Posted Nov 5, 2018
Authored by Alphan Yavas

Cisco WebEx Meetings Server suffers from an XML external entity injection vulnerability.

tags | exploit
systems | cisco
advisories | CVE-2018-18895
SHA-256 | 39042e3cffbe45edd8d3a912b89bcc36d39e3f36f804bfcc34793db23f991d10

Cisco WebEx Meetings Server XML Injection

Change Mirror Download
I. VULNERABILITY
-------------------------
Cisco WebEx Meetings Server XML External Entity

II. CVE REFERENCE
-------------------------
CVE-2018-18895

III. VENDOR
-------------------------
http://cisco.com

IV. TIMELINE
------------------------
18/09/2018 Vulnerability discovered
19/09/2018 Vendor contacted
24/10/2018 Cisco replay that they will fix it.

V. CREDIT
-------------------------
Alphan Yavas from Biznet Bilisim A.S.

VI. DESCRIPTION
-------------------------
Cisco Webex Meetings Server includes a version of Castor XML that is
affected by XXE. Because of that Cisco WebEx Meetings Server prior to
versions 2.8MR3 and 3.0MR2 patch 1 are affected from XXE
vulnerability. A remote unauthenticated attacker may lead to the
disclosure of confidential data, denial of service, server side
request forgery, port scanning from the perspective of the machine
where the parser is located, and other system impacts by using this
vulnerability.

Vulnerable path: /WBXServixe/XMLService
Vulnerable parametre: siteName

VII. SOLUTION
-------------------------
Update current Cisco WebEx Meetings Server to 2.8MR3, 3.0MR2 patch 1,
or the upcoming 4.0 release.

VIII. REFERENCES
-------------------------
You can find Ciscoas announcement from the link below:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm56811

You can find more information about XXE from the link below:
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing

Castor XML fixed this issue with CVE-2014-3004.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close