CVE-2017-12298 (CNNVD-201710-876)
中文标题:
Cisco WebEx Meeting Center 跨站脚本漏洞
英文标题:
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to con...
漏洞描述
中文描述:
Cisco WebEx Meeting Center是美国思科(Cisco)公司的一套WebEx会议解决方案中的网络在线会议产品。该产品通过电子邮件或即时消息(IM)邀请其他人加入会议,支持在线产品演示、信息共享等。 Cisco WebEx Meeting Center中存在跨站脚本漏洞,该漏洞源于程序没有充分的对传入到Web服务器上的参数执行输入验证。远程攻击者可通过拦截用户请求,并向请求中注入恶意的代码利用该漏洞在受影响Web界面的上下文中执行任意脚本代码或访问基于浏览器的敏感信息。
英文描述:
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf78615, CSCvf78628.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | webex_meeting_center | * | - | - |
cpe:2.3:a:cisco:webex_meeting_center:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2017-12298 |
2025-11-11 15:19:17 | 2025-11-11 07:34:33 |
| NVD | nvd_CVE-2017-12298 |
2025-11-11 14:55:32 | 2025-11-11 07:43:12 |
| CNNVD | cnnvd_CNNVD-201710-876 |
2025-11-11 15:09:54 | 2025-11-11 07:53:22 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-201710-876
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.1
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']