Wormable, zero-click vulnerability in Cisco Jabber gets patched a second time

Getty Photographs

Cisco has patched its Jabber conferencing and messaging software towards a important vulnerability that made it attainable for attackers to execute malicious code that might unfold from laptop to laptop with no consumer interplay required. Once more.

The vulnerability, which was first disclosed in September, was the results of a number of flaws found by researchers at safety agency Watchcom Safety. First, the app did not correctly filter probably malicious components contained in user-sent messages. The filter was primarily based on an incomplete blocklist that could possibly be bypassed utilizing a programming attribute often called onanimationstart.

Messages that contained the attribute handed on to DOM of an embedded browser. As a result of the browser was primarily based on the Chromium Embedded Framework, it might execute any scripts that made it by means of the filter.

With the filter bypassed, the researchers nonetheless needed to discover a option to escape of a safety sandbox that’s designed to maintain consumer enter from reaching delicate elements of the working system. The researchers finally settled on a perform known as CallCppFunction, which amongst different issues Cisco Jabber makes use of to open recordsdata one consumer receives from one other.

In all, Watchcom reported 4 vulnerabilities, all of which acquired patches on the similar time they had been disclosed in September. On Thursday, nevertheless, the Watchcom researchers stated fixes for 3 of them had been incomplete.

In a weblog put up, firm researchers wrote:

Two of the vulnerabilities are brought on by the flexibility to inject customized HTML tags into XMPP messages. The patch launched in September solely patched the precise injection factors that Watchcom had recognized. The underlying difficulty was not addressed. We had been subsequently capable of finding new injection factors that could possibly be used to take advantage of the vulnerabilities.

Considered one of these injection factors is the filename of a file despatched by means of Cisco Jabber. The filename is specified by the title attribute of a file tag despatched over XMPP. This attribute is displayed within the DOM when an incoming file switch is acquired. The worth of the attribute will not be sanitized earlier than being added to the DOM, making it attainable to inject arbitrary HTML tags into the file switch message by manipulating it.

No further safety measures had been put in place and it was subsequently attainable to each achieve distant code execution and steal NTLM password hashes utilizing this new injection level.

The three vulnerabilities, together with their descriptions and customary vulnerability scoring system rankings are:

  • CVE-2020-26085: Cisco Jabber Cross-Web site Scripting resulting in RCE (CVSS 9.9)
  • CVE-2020-27132: Cisco Jabber Password Hash Stealing Info Disclosure (CVSS 6.5)
  • CVE-2020-27127: Cisco Jabber Customized Protocol Handler Command Injection (CVSS 4.3)

The researchers advisable that the updates be put in as quickly as attainable. Till all staff are patched, organizations ought to take into account disabling all exterior communications. The vulnerabilities have an effect on all presently supported variations of the Cisco Jabber shopper (12.1 by means of 12.9). Cisco has particulars right here.

LEAVE A REPLY

Please enter your comment!
Please enter your name here