Rule Category

BROWSER-OTHER -- Snort has detected suspicious traffic known to exploit vulnerabilities present in an Internet browser other than Firefox, Internet Explorer, or Chrome, or which is present in multiple browsers. This rule should be enabled for systems that use any mainstream browser, to offer complete coverage. (ie, If a vulnerability affects both Chrome and Firefox, but is covered by a rule under the Chrome category, Firefox users might have Chrome coverage turned off and miss the vulnerability.)

Alert Message

BROWSER-OTHER Cisco Jabber protocol cross-site scripting attempt

Rule Explanation

The rule checks for the attempt by an attacker to exploit a Cisco Jabber protocol by attempting to execute a remote code.

What To Look For

This rules alert on exploit traffic that attempts to execute a remote code.

Known Usage

Public information/Proof of Concept available

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

Cross Site Scripting (XSS)

Cross Site Scripting (XSS) attackers send malicious input to a site that does not validate the input, usually in the form of a script. The application sends the malicious code to the browsers of other users, which will execute the script unknowingly. The malicious code uses the trust of the host website to access cookies, session tokens, or other sensitive information. There are multiple types of XSS, including Stored, Reflected, and DOM based.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2020-26085
Loading description

MITRE ATT&CK Framework

Tactic: Execution

Technique: Scripting

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org