Show plain JSON{"id": "CVE-2021-1525", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 4.7, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.8}]}, "published": "2021-06-04T17:15:08.533", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-redirect-XuZFU3PH", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-601"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to redirect users to a malicious file. This vulnerability is due to improper validation of URL paths in the application interface. An attacker could exploit this vulnerability by persuading a user to follow a specially crafted URL that is designed to cause Cisco Webex Meetings to include a remote file in the web UI. A successful exploit could allow the attacker to cause the application to offer a remote file to a user, which could allow the attacker to conduct further phishing or spoofing attacks."}, {"lang": "es", "value": "Una vulnerabilidad en Cisco Webex Meetings y Cisco Webex Meetings Server, podr\u00eda permitir a un atacante remoto no autenticado redireccionar a usuarios a un archivo malicioso. Esta vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de las rutas de URL en la interfaz de la aplicaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad al persuadir a un usuario de que siga una URL especialmente dise\u00f1ada para causar que Cisco Webex Meetings incluya un archivo remoto en la interfaz web. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que la aplicaci\u00f3n ofrezca un archivo remoto a un usuario, lo que podr\u00eda permitir al atacante conducir nuevos ataques de phishing o spoofing"}], "lastModified": "2023-11-07T03:28:31.390", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:webex_meetings_online:41.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7C13646-5DC5-4604-ADD1-E590EC79ECC4"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE22BE9B-374E-43DC-BA91-E3B9699A4C7C", "versionEndExcluding": "3.0"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D1081F-87E8-4E8B-BEBD-0F239E745586"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D138973-02B0-4FEC-A646-FF1278DA1EDF"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30B55A5B-8C5E-4ECB-9C85-A8A3A3030850"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14DBEC10-0641-441C-BE15-8F72C1762DCE"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D6CF856-093A-4E89-A71D-50A2887C265B"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B36A9043-0621-43CD-BFCD-66529F937859"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8842B42E-C412-4356-9F54-DFC53B683D3E"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D25BC647-C569-46E5-AD45-7E315EBEB784"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3_security_patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA561408-D53D-43B9-A464-A413EC2E083E"}, {"criteria": "cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3_security_patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54FE49E6-3153-46FD-B54A-CA5061834AD8"}], "operator": "OR"}]}], "sourceIdentifier": "ykramarz@cisco.com"}