ManageEngine OpManager Login.do Multiple Parameter XSS

medium Nessus Plugin ID 27818

Synopsis

The remote web server contains a script that is affected by several cross-site scripting vulnerabilities.

Description

The remote host is running ManageEngine OpManager, a web-based network management application.

The version of ManageEngine OpManager installed on the remote host fails to sanitize user input to the 'requestid' parameter of the 'jsp/Login.do' script before using it to generate dynamic content. An unauthenticated, remote attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Note that the 'fileid', 'woMode', and 'woID' parameters of the same script are also reportedly affected, although Nessus did not explicitly test those.

Solution

Unknown at this time.

See Also

https://secuniaresearch.flexerasoftware.com/advisories/27456/

Plugin Details

Severity: Medium

ID: 27818

File Name: opmanager_login_xss.nasl

Version: 1.15

Type: remote

Published: 11/7/2007

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Exploit Ease: No exploit is required

Vulnerability Publication Date: 11/7/2007

Reference Information

CVE: CVE-2007-5891

BID: 26368

CWE: 79