lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 2 Nov 2018 10:10:43 +0300
From: alphan yavaş <ayavasa94@...il.com>
To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org
Subject: [FD] Disclose Vulnerability

I. VULNERABILITY
-------------------------
Cisco WebEx Meetings Server XML External Entity

II. CVE REFERENCE
-------------------------
CVE-2018-18895

III. VENDOR
-------------------------
http://cisco.com

IV. TIMELINE
------------------------
18/09/2018 Vulnerability discovered
19/09/2018 Vendor contacted
24/10/2018 Cisco replay that they will fix it.

V. CREDIT
-------------------------
Alphan Yavas from Biznet Bilisim A.S.

VI. DESCRIPTION
-------------------------
Cisco Webex Meetings Server includes a version of Castor XML that is
affected by XXE. Because of that Cisco WebEx Meetings Server prior to
versions 2.8MR3 and 3.0MR2 patch 1 are affected from XXE
vulnerability. A remote unauthenticated attacker may lead to the
disclosure of confidential data, denial of service, server side
request forgery, port scanning from the perspective of the machine
where the parser is located, and other system impacts by using this
vulnerability.

Vulnerable path: /WBXServixe/XMLService
Vulnerable parametre: siteName

VII. SOLUTION
-------------------------
Update current Cisco WebEx Meetings Server to 2.8MR3, 3.0MR2 patch 1,
or the upcoming 4.0 release.

VIII. REFERENCES
-------------------------
You can find Cisco’s announcement from the link below:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm56811

You can find more information about XXE from the link below:
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing

Castor XML fixed this issue with CVE-2014-3004.

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists