Cisco WebEx Extension for Firefox < 1.0.12 'atgpcext' Library GPC Sanitization RCE (cisco-sa-20170717-webex)

High Nessus Plugin ID 101817


A browser extension installed on the remote host is affected by a remote code execution vulnerability.


The Cisco WebEx Extension for Firefox installed on the remote host is a version prior to 1.0.12. It is, therefore, affected by a remote code execution vulnerability in the 'atgpcext' library due to incomplete GPC sanitization. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to execute arbitrary code with the privileges of the affected browser.


Upgrade to Cisco WebEx Extension for Firefox version 1.0.12 or later.

See Also

Plugin Details

Severity: High

ID: 101817

File Name: cisco_webex_extension_1_0_12_firefox.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 2017/07/19

Updated: 2018/07/06

Dependencies: 96534

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox, SMB/WindowsVersion

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/07/17

Vulnerability Publication Date: 2017/07/17

Reference Information

CVE: CVE-2017-6753

BID: 99614