A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
References
Configurations
Configuration 1 (hide)
|
History
07 May 2025, 16:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco enterprise Chat And Email
Cisco |
|
CPE | cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM - Vendor Advisory |
21 Nov 2024, 08:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM - |
03 Apr 2024, 17:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-03 17:15
Updated : 2025-05-07 16:17
NVD link : CVE-2024-20367
Mitre link : CVE-2024-20367
CVE.ORG link : CVE-2024-20367
JSON object : View
Products Affected
cisco
- enterprise_chat_and_email
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')