Cisco WebEx for Firefox RCE (cisco-sa-20170124-webex)

high Nessus Plugin ID 96907

Synopsis

A browser extension installed on the remote host is affected by a remote code execution vulnerability.

Description

The Cisco WebEx Extension for Firefox installed on the remote host is affected by a remote code execution vulnerability due to a crafted pattern that permits any URL utilizing it to automatically use native messaging to access sensitive functionality provided by the extension.
An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code by convincing a user to visit a web page that contains this pattern and starting a WebEx session.

Solution

Upgrade ActiveTouch General Plugin Container to version 106, or else upgrade Cisco WebEx Extension to version 1.0.5 or later. However, if you are using both, then you will need to upgrade both.

See Also

http://www.nessus.org/u?068aee48

https://bugs.chromium.org/p/project-zero/issues/detail?id=1096

https://bugs.chromium.org/p/project-zero/issues/detail?id=1100

Plugin Details

Severity: High

ID: 96907

File Name: cisco_webex_extension_rce_firefox.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 1/31/2017

Updated: 7/6/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/28/2017

Vulnerability Publication Date: 1/23/2017

Exploitable With

Metasploit (Cisco WebEx Chrome Extension RCE (CVE-2017-3823))

Reference Information

CVE: CVE-2017-3823

BID: 95737