CVE-2014-8024

Current Description

The API in the Guest Server in Cisco Jabber, when the HTML5 CORS feature is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST request, aka Bug ID CSCus19789.

Basic Data

PublishedDecember 23, 2014
Last ModifiedJanuary 03, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCiscoJabber Guest********

Vulnerable Software List

VendorProductVersions
Cisco Jabber Guest *

References

NameSourceURLTags
20141222 Cisco Jabber Guest Server HTML5 cross-origin resource sharinghttp://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024CISCOVendor Advisory
71770http://www.securityfocus.com/bid/71770BID
1031422http://www.securitytracker.com/id/1031422SECTRACK
20150106 Cisco Jabber Guest Server HTML5 Information Disclosure Vulnerabilityhttps://tools.cisco.com/security/center/viewAlert.x?alertId=36870CISCO