First published: Sun Dec 27 2015(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in IPSwitch WhatsUp Gold before 16.4 allow remote attackers to inject arbitrary web script or HTML via (1) an SNMP OID object, (2) an SNMP trap message, (3) the View Names field, (4) the Group Names field, (5) the Flow Monitor Credentials field, (6) the Flow Monitor Threshold Name field, (7) the Task Library Name field, (8) the Task Library Description field, (9) the Policy Library Name field, (10) the Policy Library Description field, (11) the Template Library Name field, (12) the Template Library Description field, (13) the System Script Library Name field, (14) the System Script Library Description field, or (15) the CLI Settings Library Description field.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <=16.3 | |
Progress Software WhatsUp Gold | <=16.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6005 is classified as a high severity vulnerability due to the potential for remote code execution via cross-site scripting.
To fix CVE-2015-6005, upgrade to WhatsUp Gold version 16.4 or later where the vulnerabilities have been addressed.
The exploit vectors for CVE-2015-6005 include injecting malicious scripts through SNMP OID objects, SNMP trap messages, and various user input fields.
WhatsUp Gold versions prior to 16.4, including all versions up to and including 16.3, are affected by CVE-2015-6005.
CVE-2015-6005 is classified as a cross-site scripting (XSS) vulnerability.