Cisco WebEx Extension for Firefox < 1.0.12 'atgpcext' Library GPC Sanitization RCE (cisco-sa-20170717-webex)

High Nessus Plugin ID 101817


A browser extension installed on the remote host is affected by a remote code execution vulnerability.


The Cisco WebEx Extension for Firefox installed on the remote host is a version prior to 1.0.12. It is, therefore, affected by a remote code execution vulnerability in the 'atgpcext' library due to incomplete GPC sanitization. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to execute arbitrary code with the privileges of the affected browser.


Upgrade to Cisco WebEx Extension for Firefox version 1.0.12 or later.

See Also

Plugin Details

Severity: High

ID: 101817

File Name: cisco_webex_extension_1_0_12_firefox.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2017/07/19

Modified: 2017/08/14

Dependencies: 96534

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.8

Temporal Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:mozilla:firefox, cpe:/a:cisco:webex

Required KB Items: installed_sw/Mozilla Firefox, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/07/17

Vulnerability Publication Date: 2017/07/17

Reference Information

CVE: CVE-2017-6753

BID: 99614

OSVDB: 161125

CISCO-SA: cisco-sa-20170717-webex

CISCO-BUG-ID: CSCvf15012, CSCvf15020, CSCvf15030, CSCvf15033, CSCvf15036, CSCvf15037

IAVA: 2017-A-0216