The gadgets-integration API in Cisco Finesse 8.5(1) through 8.5(5), 8.6(1), 9.0(1), 9.0(2), 9.1(1), 9.1(1)SU1, 9.1(1)SU1.1, 9.1(1)ES1 through 9.1(1)ES5, 10.0(1), 10.0(1)SU1, 10.0(1)SU1.1, 10.5(1), 10.5(1)ES1 through 10.5(1)ES4, 10.5(1)SU1, 10.5(1)SU1.1, 10.5(1)SU1.7, 10.6(1), 10.6(1)SU1, 10.6(1)SU2, and 11.0(1) allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted request, aka Bug ID CSCuw86623.
| Software | From | Fixed in |
|---|---|---|
| cisco / finesse | 8.5(5)_base | 8.5(5)_base.x |
| cisco / finesse | 10.0(1)_su1.1 | 10.0(1)_su1.1.x |
| cisco / finesse | 10.6(1)_su1 | 10.6(1)_su1.x |
| cisco / finesse | 10.5(1)_es2 | 10.5(1)_es2.x |
| cisco / finesse | 8.6(1)_base | 8.6(1)_base.x |
| cisco / finesse | 10.0(1)_base | 10.0(1)_base.x |
| cisco / finesse | 10.5(1)_su1.7 | 10.5(1)_su1.7.x |
| cisco / finesse | 10.6(1)_su2 | 10.6(1)_su2.x |
| cisco / finesse | 11.0(1)_base | 11.0(1)_base.x |
| cisco / finesse | 9.1(1)_es5 | 9.1(1)_es5.x |
| cisco / finesse | 10.5(1)_es1 | 10.5(1)_es1.x |
| cisco / finesse | 10.5(1)_su1.1 | 10.5(1)_su1.1.x |
| cisco / finesse | 10.5(1)_es4 | 10.5(1)_es4.x |
| cisco / finesse | 10.0(1)_su1 | 10.0(1)_su1.x |
| cisco / finesse | 9.1(1)_su1 | 9.1(1)_su1.x |
| cisco / finesse | 10.5(1)_es3 | 10.5(1)_es3.x |
| cisco / finesse | 8.5(2)_base | 8.5(2)_base.x |
| cisco / finesse | 9.1(1)_es2 | 9.1(1)_es2.x |
| cisco / finesse | 10.6(1)_base | 10.6(1)_base.x |
| cisco / finesse | 9.1(1)_su1.1 | 9.1(1)_su1.1.x |
| cisco / finesse | 9.1(1)_base | 9.1(1)_base.x |
| cisco / finesse | 9.0(1)_base | 9.0(1)_base.x |
| cisco / finesse | 8.5(1)_base | 8.5(1)_base.x |
| cisco / finesse | 9.1(1)_es3 | 9.1(1)_es3.x |
| cisco / finesse | 10.5(1)_su1 | 10.5(1)_su1.x |
| cisco / finesse | 8.5(4)_base | 8.5(4)_base.x |
| cisco / finesse | 10.5(1)_base | 10.5(1)_base.x |
| cisco / finesse | 9.1(1)_es4 | 9.1(1)_es4.x |
| cisco / finesse | 8.5(3)_base | 8.5(3)_base.x |
| cisco / finesse | 9.1(1)_es1 | 9.1(1)_es1.x |
| cisco / finesse | 9.0(2)_base | 9.0(2)_base.x |