First published: Fri Jul 06 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine NetFlow Analyzer 5 allow remote attackers to inject arbitrary web script or HTML via the (1) alpha parameter in (a) netflow/jspui/applicationList.jsp, the (2) task parameter in (b) netflow/jspui/appConfig.jsp, the (3) view parameter in (c) netflow/jspui/index.jsp, and the (4) rtype parameter in (d) netflow/jspui/selectDevice.jsp and (e) netflow/jspui/customReport.jsp. NOTE: it was later reported that vector 3 also affects 7.5 build 7500.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine NetFlow Analyzer | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3593 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2007-3593, update ManageEngine NetFlow Analyzer to the latest patched version provided by the vendor.
CVE-2007-3593 allows remote attackers to execute arbitrary JavaScript or HTML via unsanitized input in specific parameters.
ManageEngine NetFlow Analyzer version 5 is affected by CVE-2007-3593.
Yes, CVE-2007-3593 can lead to data theft as attackers can inject scripts that steal session cookies or other sensitive information.