April 26, 2025
2
min read
OCD Tech

CVE-2019-7004

Editor
OCD Tech
Category
Cybersecurity
Date
April 26, 2025

On an external penetration test earlier this year, OCD Tech came across an instance of Avaya’s IP Office Web Collaboration software on a client’s in-scope internet-facing system. This web-based software allows employees and external users to host and join meetings leveraging Avaya’s business Voice-over-IP (VoIP) software solutions. While use of the platform requires credentials, a login page was exposed to the internet to allow external users a means to join meetings. Via a dedicated review of this software, which was fully patched at the time of the test, the OCD Tech penetration testing team was able to identify a new cross site scripting vulnerability affecting the “Username” parameter of the login form. By injecting a specialized string into the username field, the OCD Tech team was able to execute arbitrary JavaScript in the context of the web browser. OCD Tech worked with the vendor to responsibly disclose the identified vulnerability, which was acknowledged and patched by Avaya within a reasonable timeframe. After the patch was made available to Avaya’s customers, a public disclosure of the vulnerability was released, and OCD Tech was awarded CVE-2019-7004 for the discovery of this cross site scripting vulnerability. OCD Tech prides itself on professional penetration testing services, and responsible disclosure of newly identified vulnerabilities. For more information, please see the following vulnerability disclosures:

The National Institute for Standards and Technology National Vulnerability Database

Mitre Common Vulnerabilities and Exposures Database:

Avaya Security Advisory (ASA-2019-213)

Congratulations to Daniel Bohan, OSCP of OCD Tech, for their discovery of this net-new vulnerability, and taking responsible steps to help Avaya secure their customer’s systems.

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

CVE-2019-7004

By  
OCD Tech
December 12, 2019
2
min read
Share this post

On an external penetration test earlier this year, OCD Tech came across an instance of Avaya’s IP Office Web Collaboration software on a client’s in-scope internet-facing system. This web-based software allows employees and external users to host and join meetings leveraging Avaya’s business Voice-over-IP (VoIP) software solutions. While use of the platform requires credentials, a login page was exposed to the internet to allow external users a means to join meetings. Via a dedicated review of this software, which was fully patched at the time of the test, the OCD Tech penetration testing team was able to identify a new cross site scripting vulnerability affecting the “Username” parameter of the login form. By injecting a specialized string into the username field, the OCD Tech team was able to execute arbitrary JavaScript in the context of the web browser. OCD Tech worked with the vendor to responsibly disclose the identified vulnerability, which was acknowledged and patched by Avaya within a reasonable timeframe. After the patch was made available to Avaya’s customers, a public disclosure of the vulnerability was released, and OCD Tech was awarded CVE-2019-7004 for the discovery of this cross site scripting vulnerability. OCD Tech prides itself on professional penetration testing services, and responsible disclosure of newly identified vulnerabilities. For more information, please see the following vulnerability disclosures:

The National Institute for Standards and Technology National Vulnerability Database

Mitre Common Vulnerabilities and Exposures Database:

Avaya Security Advisory (ASA-2019-213)

Congratulations to Daniel Bohan, OSCP of OCD Tech, for their discovery of this net-new vulnerability, and taking responsible steps to help Avaya secure their customer’s systems.

Share this post
OCD Tech