First published: Fri Jul 06 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in AdventNet ManageEngine OpManager 6 and 7 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter in (a) ping.do and (b) traceRoute.do in map/; the (2) reportName, (3) displayName, and (4) selectedNode parameters to (c) reports/ReportViewAction.do; the (5) operation parameter to (d) admin/ServiceConfiguration.do; and the (6) selectedNode and (7) selectedTab parameters to (e) admin/DeviceAssociation.do. NOTE: the searchTerm parameter in Search.do is already covered by CVE-2006-2343.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ManageEngine NetFlow Analyzer | =6 | |
ManageEngine NetFlow Analyzer | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3594 is classified as a medium severity vulnerability due to its cross-site scripting (XSS) nature.
To fix CVE-2007-3594, update AdventNet ManageEngine OpManager to the latest patched version provided by the vendor.
CVE-2007-3594 affects AdventNet ManageEngine OpManager versions 6 and 7.
Attackers can exploit CVE-2007-3594 by injecting arbitrary web scripts through specific parameters like name, reportName, displayName, and selectedNode.
CVE-2007-3594 can facilitate cross-site scripting attacks enabling attackers to execute malicious scripts in the context of the user's browser.