An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in the Administration zone /netflow/jspui/scheduleConfig.jsp file via these GET parameters: devSrc, emailId, excWeekModify, filterFlag, getFilter, mailReport, mset, popup, rep_schedule, rep_Type, schDesc, schName, schSource, selectDeviceDone, task, val10, and val11.
References
Link | Resource |
---|---|
https://www.manageengine.com/products/netflow/?doc | Product Vendor Advisory |
https://www.exploit-db.com/exploits/46425/ | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Feb/45 | Mailing List Exploit Third Party Advisory |
http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-05-17 08:29
Updated : 2019-05-17 10:25
NVD link : CVE-2019-8927
Mitre link : CVE-2019-8927
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
zohocorp
- manageengine_netflow_analyzer