BROWSER-OTHER -- Snort has detected suspicious traffic known to exploit vulnerabilities present in an Internet browser other than Firefox, Internet Explorer, or Chrome, or which is present in multiple browsers. This rule should be enabled for systems that use any mainstream browser, to offer complete coverage. (ie, If a vulnerability affects both Chrome and Firefox, but is covered by a rule under the Chrome category, Firefox users might have Chrome coverage turned off and miss the vulnerability.)
BROWSER-OTHER Cisco Jabber protocol cross-site scripting attempt
The rule checks for the attempt by an attacker to exploit a Cisco Jabber protocol by attempting to execute a remote code.
This rules alert on exploit traffic that attempts to execute a remote code.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
No rule groups
Cross Site Scripting (XSS)
Cross Site Scripting (XSS) attackers send malicious input to a site that does not validate the input, usually in the form of a script. The application sends the malicious code to the browsers of other users, which will execute the script unknowingly. The malicious code uses the trust of the host website to access cookies, session tokens, or other sensitive information. There are multiple types of XSS, including Stored, Reflected, and DOM based.
CVE-2020-26085 |
Loading description
|
Tactic: Execution
Technique: Scripting
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org