Cisco WebEx Extension for Chrome < 1.0.12 'atgpcext' Library GPC Sanitization RCE (cisco-sa-20170717-webex)

high Nessus Plugin ID 101816

Synopsis

A browser extension installed on the remote host is affected by a remote code execution vulnerability.

Description

The Cisco WebEx Extension for Chrome installed on the remote host is a version prior to 1.0.12. It is, therefore, affected by a remote code execution vulnerability in the 'atgpcext' library due to incomplete GPC sanitization. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to execute arbitrary code with the privileges of the affected browser.

Solution

Upgrade to Cisco WebEx Extension for Chrome version 1.0.12 or later.

See Also

http://www.nessus.org/u?0a976aaa

https://bugs.chromium.org/p/project-zero/issues/detail?id=1324

https://thehackernews.com/2017/07/cisco-webex-vulnerability.html

Plugin Details

Severity: High

ID: 101816

File Name: cisco_webex_extension_1_0_12_chrome.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 7/19/2017

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:google:chrome, cpe:/a:cisco:webex

Required KB Items: SMB/Google_Chrome/Installed, SMB/WindowsVersion

Exploit Ease: No known exploits are available

Patch Publication Date: 7/17/2017

Vulnerability Publication Date: 7/17/2017

Reference Information

CVE: CVE-2017-6753

BID: 99614