Menu
Cisco starts patching critical flaw in WebEx browser extension

Cisco starts patching critical flaw in WebEx browser extension

The vulnerability could allow attackers to remotely execute malicious code on computers

Cisco Systems has started to patch a critical vulnerability in its WebEx collaboration and conferencing browser extension that could allow attackers to remotely execute malicious code on computers.

The company released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions.

The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.

Cisco tried to fix the problem in version 1.0.5 by restricting the sensitive features only to the *.webex.com or *.webex.com.cn domains. That didn't solve the problem completely because any cross-site scripting (XSS) vulnerability on those domains could be used to bypass the restrictions.

XSS is one of the most common types of vulnerabilities on the web and webex.com has more than 500 defined subdomains. Chances are high that multiple XSS flaws exist those websites and, in fact, Ormandy found one and proved a bypass of the initial patch.

Cisco added further restrictions in version 1.0.7 of the WebEx extension that appears to block all known bypass methods.

"It looks like they correctly handle Mac and Windows, and have also added some verification on GpcInitCall/GpcExitCall/etc so that functions have to match a RegEx," Ormandy said. "This looks like a huge improvement."

Ormandy added that he doesn't currently know of any way to defeat the new patch, so users should upgrade to the latest version as soon as possible.

The Chrome WebEx extension alone has around 20 million active users, so the risk of attacks is high, especially since details of this vulnerability have been public for days. IE and Firefox users who have the extension installed should disable it until a fixed version is released for those browsers.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments