CVE-2019-1636
Cisco Webex Teams URI Handler Insecure Library Loading Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the Cisco Webex Teams client, formerly Cisco Spark, could allow an attacker to execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI that is defined in Windows operating systems. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.
Una vulnerabilidad en el cliente de Cisco Webex Teams, anteriormente Cisco Spark, podría permitir que un atacante ejecute comandos arbitrarios en un sistema objetivo. Esta vulnerabilidad se debe a rutas de búsqueda inseguras empleadas por el URI de la aplicación que se define en los sistemas operativos Windows. Un atacante podría explotar esta vulnerabilidad convenciendo a un usuario objetivo para que siga un enlace malicioso. Su explotación con éxito podría provocar que la aplicación cargue bibliotecas desde el directorio al que señala el enlace del URI. El atacante podría emplear este comportamiento para ejecutar comandos arbitrarios en el sistema con los privilegios del usuario objetivo si el atacante es capaz de colocar una biblioteca manipulada en un directorio al que puede acceder el sistema vulnerable.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webex Cisco Spark. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.
There is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-06 CVE Reserved
- 2019-01-23 CVE Published
- 2023-03-07 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106718 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Webex Teams Search vendor "Cisco" for product "Webex Teams" | 3.0.4533 Search vendor "Cisco" for product "Webex Teams" and version "3.0.4533" | - |
Affected
|