Cisco WebEx Extension for Firefox < 1.0.12 'atgpcext' Library GPC Sanitization RCE (cisco-sa-20170717-webex)

high Nessus Plugin ID 101817

Synopsis

A browser extension installed on the remote host is affected by a remote code execution vulnerability.

Description

The Cisco WebEx Extension for Firefox installed on the remote host is a version prior to 1.0.12. It is, therefore, affected by a remote code execution vulnerability in the 'atgpcext' library due to incomplete GPC sanitization. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to execute arbitrary code with the privileges of the affected browser.

Solution

Upgrade to Cisco WebEx Extension for Firefox version 1.0.12 or later.

See Also

http://www.nessus.org/u?0a976aaa

https://thehackernews.com/2017/07/cisco-webex-vulnerability.html

Plugin Details

Severity: High

ID: 101817

File Name: cisco_webex_extension_1_0_12_firefox.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 7/19/2017

Updated: 7/6/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox, SMB/WindowsVersion

Exploit Ease: No known exploits are available

Patch Publication Date: 7/17/2017

Vulnerability Publication Date: 7/17/2017

Reference Information

CVE: CVE-2017-6753

BID: 99614