First published: Fri Apr 22 2016(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Micro Focus Novell Service Desk before 7.2 allow remote authenticated users to inject arbitrary web script or HTML via a certain (1) user name, (2) tf_aClientFirstName, (3) tf_aClientLastName, (4) ta_selectedTopicContent, (5) tf_orgUnitName, (6) tf_aManufacturerFullName, (7) tf_aManufacturerName, (8) tf_aManufacturerAddress, or (9) tf_aManufacturerCity parameter.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Service Desk | <=7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1596 is classified as a moderate severity vulnerability due to its potential for exploitation through cross-site scripting.
To fix CVE-2016-1596, upgrade to Novell Service Desk version 7.2 or later, which addresses these XSS vulnerabilities.
CVE-2016-1596 affects all versions of Micro Focus Novell Service Desk prior to version 7.2.
The vulnerable inputs in CVE-2016-1596 include user name, client first name, client last name, selected topic content, and organization unit name.
No, CVE-2016-1596 can only be exploited by remote authenticated users.