ID

VAR-200711-0277


CVE

CVE-2007-5581


TITLE

Cisco Unified MeetingPlace of mpweb/scripts/mpx.dll Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2007-002808

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in mpweb/scripts/mpx.dll in Cisco Unified MeetingPlace 5.4 and earlier and 6.0 allow remote attackers to inject arbitrary web script or HTML via the (1) FirstName and (2) LastName parameters. Exploiting these issues may help the attacker steal cookie-based authentication credentials and launch other attacks. These issues affect Unified MeetingPlace 6.0, 5.4, 5.3, and prior versions. Cisco Unified MeetingPlace is a set of multimedia conferencing solutions of Cisco (Cisco). This solution provides a user environment that integrates voice, video and Web conferencing. An input filtering vulnerability exists when MeetingPlace processes user data. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Input passed to certain parameters (e.g."FirstName" and "LastName") in mpweb/scripts/mpx.dll is not properly sanitised before being returned to a user. These can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. SOLUTION: Apply hotfix 5.4.156.2E or 6.0.244.1A, available via Cisco TAC (Technical Assistance Center). PROVIDED AND/OR DISCOVERED BY: Joren McReynolds ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20071107-mp.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-5581 // JVNDB: JVNDB-2007-002808 // BID: 26364 // VULHUB: VHN-28943 // PACKETSTORM: 60752

AFFECTED PRODUCTS

vendor:ciscomodel:unified meetingplacescope:lteversion:5.4

Trust: 1.8

vendor:ciscomodel:unified meetingplacescope:eqversion:6.0

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:4.3.0.246.5

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:5.0

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:5.3

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:5

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:5.2

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:4.3.0.246

Trust: 1.6

vendor:ciscomodel:unified meetingplacescope:eqversion:and 6.0

Trust: 0.8

vendor:ciscomodel:unified meetingplacescope:eqversion:5.4

Trust: 0.6

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.3.447

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:6.0.170.0

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.4.70.0

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.3.447.4

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.3.333.0

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.3.104.3

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:5.3.104.0

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:4.3.0.246.5

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:eqversion:4.3.0.246

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conference .1ascope:neversion:6.0.244

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conference .2escope:neversion:5.4.156

Trust: 0.3

vendor:ciscomodel:unified meetingplace web conferencescope:neversion:6.0.639.10

Trust: 0.3

sources: BID: 26364 // JVNDB: JVNDB-2007-002808 // CNNVD: CNNVD-200711-116 // NVD: CVE-2007-5581

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5581
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-5581
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-116
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28943
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-5581
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28943
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28943 // JVNDB: JVNDB-2007-002808 // CNNVD: CNNVD-200711-116 // NVD: CVE-2007-5581

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-28943 // JVNDB: JVNDB-2007-002808 // NVD: CVE-2007-5581

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-116

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 60752 // CNNVD: CNNVD-200711-116

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002808

PATCH

title:Document ID: 626url:http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20071107-mp

Trust: 0.8

sources: JVNDB: JVNDB-2007-002808

EXTERNAL IDS

db:NVDid:CVE-2007-5581

Trust: 2.8

db:BIDid:26364

Trust: 2.0

db:SECUNIAid:26462

Trust: 1.8

db:VUPENid:ADV-2007-3772

Trust: 1.7

db:SECTRACKid:1018904

Trust: 1.7

db:JVNDBid:JVNDB-2007-002808

Trust: 0.8

db:CISCOid:20071107 CISCO UNIFIED MEETINGPLACE XSS VULNERABILITY

Trust: 0.6

db:XFid:38298

Trust: 0.6

db:CNNVDid:CNNVD-200711-116

Trust: 0.6

db:VULHUBid:VHN-28943

Trust: 0.1

db:PACKETSTORMid:60752

Trust: 0.1

sources: VULHUB: VHN-28943 // BID: 26364 // JVNDB: JVNDB-2007-002808 // PACKETSTORM: 60752 // CNNVD: CNNVD-200711-116 // NVD: CVE-2007-5581

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sr-20071107-mp.shtml

Trust: 2.1

url:http://www.securityfocus.com/bid/26364

Trust: 1.7

url:http://securitytracker.com/id?1018904

Trust: 1.7

url:http://secunia.com/advisories/26462

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3772

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38298

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5581

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5581

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3772

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/38298

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/ps5664/ps5669/index.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13661/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/26462/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/13663/

Trust: 0.1

sources: VULHUB: VHN-28943 // BID: 26364 // JVNDB: JVNDB-2007-002808 // PACKETSTORM: 60752 // CNNVD: CNNVD-200711-116 // NVD: CVE-2007-5581

CREDITS

Joren McReynolds

Trust: 0.6

sources: CNNVD: CNNVD-200711-116

SOURCES

db:VULHUBid:VHN-28943
db:BIDid:26364
db:JVNDBid:JVNDB-2007-002808
db:PACKETSTORMid:60752
db:CNNVDid:CNNVD-200711-116
db:NVDid:CVE-2007-5581

LAST UPDATE DATE

2024-11-23T22:43:19.449000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28943date:2017-07-29T00:00:00
db:BIDid:26364date:2010-07-08T17:17:00
db:JVNDBid:JVNDB-2007-002808date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200711-116date:2007-11-08T00:00:00
db:NVDid:CVE-2007-5581date:2024-11-21T00:38:14.857

SOURCES RELEASE DATE

db:VULHUBid:VHN-28943date:2007-11-08T00:00:00
db:BIDid:26364date:2007-11-07T00:00:00
db:JVNDBid:JVNDB-2007-002808date:2012-06-26T00:00:00
db:PACKETSTORMid:60752date:2007-11-07T20:19:41
db:CNNVDid:CNNVD-200711-116date:2007-11-07T00:00:00
db:NVDid:CVE-2007-5581date:2007-11-08T02:46:00