

Wormable code-execution flaw in Cisco Jabber has a severity rating of 9.9 out of...
source link: https://arstechnica.com/information-technology/2020/12/wormable-zero-click-vulnerability-in-cisco-jabber-gets-patched-a-second-time/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

PATCH REDO —
Wormable code-execution flaw in Cisco Jabber has a severity rating of 9.9 out of 10
The company failed to adequately fix the vulnerability before, so it’s trying again.
Dan Goodin - 12/11/2020, 8:43 PM

Cisco has patched its Jabber conferencing and messaging application against a critical vulnerability that made it possible for attackers to execute malicious code that would spread from computer to computer with no user interaction required. Again.
The vulnerability, which was first disclosed in September, was the result of several flaws discovered by researchers at security firm Watchcom Security. First, the app failed to properly filter potentially malicious elements contained in user-sent messages. The filter was based on an incomplete blocklist that could be bypassed using a programming attribute known as onanimationstart.Messages that contained the attribute passed directly to DOM of an embedded browser. Because the browser was based on the Chromium Embedded Framework, it would execute any scripts that made it through the filter.
With the filter bypassed, the researchers still had to find a way to break out of a security sandbox that’s designed to keep user input from reaching sensitive parts of the operating system. The researchers eventually settled on a function called CallCppFunction, which among other things Cisco Jabber uses to open files one user receives from another.
In all, Watchcom reported four vulnerabilities, all of which received patches at the same time they were disclosed in September. On Thursday, however, the Watchcom researchers said fixes for three of them were incomplete.
AdvertisementIn a blog post, company researchers wrote:
Two of the vulnerabilities are caused by the ability to inject custom HTML tags into XMPP messages. The patch released in September only patched the specific injection points that Watchcom had identified. The underlying issue was not addressed. We were therefore able to find new injection points that could be used to exploit the vulnerabilities.
One of these injection points is the filename of a file sent through Cisco Jabber. The filename is specified by the name attribute of a file tag sent over XMPP. This attribute is displayed in the DOM when an incoming file transfer is received. The value of the attribute is not sanitized before being added to the DOM, making it possible to inject arbitrary HTML tags into the file transfer message by manipulating it.
No additional security measures had been put in place and it was therefore possible to both gain remote code execution and steal NTLM password hashes using this new injection point.
The three vulnerabilities, along with their descriptions and common vulnerability scoring system ratings are:
- CVE-2020-26085: Cisco Jabber Cross-Site Scripting leading to RCE (CVSS 9.9)
- CVE-2020-27132: Cisco Jabber Password Hash Stealing Information Disclosure (CVSS 6.5)
- CVE-2020-27127: Cisco Jabber Custom Protocol Handler Command Injection (CVSS 4.3)
The researchers recommended that the updates be installed as soon as possible. Until all employees are patched, organizations should consider disabling all external communications. The vulnerabilities affect all currently supported versions of the Cisco Jabber client (12.1 through 12.9). Cisco has details here.
Recommend
-
37
XMPP Echo Bot Do you know that situation, you really really need an XMPP echo bot, but you don’t have access to high-level tools like Python to write one? A...
-
53
README This is jabber.el 0.8.92, an XMPP client for Emacs. XMPP (also known as 'Jabber') is an instant messaging system; see h...
-
40
The most serious vulnerabilities in Cisco’s 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the filesystem. Cisco Sys...
-
12
Zero-Click Wormable RCE Vulnerability Reported in Microsoft Teams December 07, 2020
-
10
XMPP/Jabber is a communication protocol typically used for chat servers. Nathan Fritz wrote a PHP library for XMPP called XMPPHP. These examples demonstrate how to use the library in PHP....
-
11
‘Wormable’ Flaw Leads January 2022 Patch Tuesday – Krebs on Security Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities we...
-
15
9.8! — Zyxel silently patches command-injection vulnerability with 9.8 severity rating Flaw makes it possible to install web shell to maintain control of affected devices.
-
11
Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday This month’s Patch Tuesday offers a little som...
-
5
GOT PATCHES? — VMware bug with 9.8 severity rating exploited to install witch’s brew of malware If you haven't patched CVE-2022-22954 yet, now would be an excellent time to...
-
8
EXPLOITS GONE WILD — VMware patches vulnerability with 9.8/10 severity rating in Cloud Foundation NSX-V appliance, which VMware no longer supports, also affected and patche...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK