First published: Mon Jul 31 2017(Updated: )
services/system_io/actionprocessor/Contact.rails in ConnectWise Manage 2017.5 allows arbitrary client-side JavaScript code execution (involving a ContactCommon field) on victims who click on a crafted link, aka XSS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ConnectWise | =2017.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11727 is classified as a medium severity vulnerability due to its potential for arbitrary client-side JavaScript execution.
To fix CVE-2017-11727, update ConnectWise Manage to the latest version where the vulnerability has been patched.
CVE-2017-11727 allows attackers to execute arbitrary JavaScript in the context of a victim's browser, which can lead to unauthorized actions or data theft.
CVE-2017-11727 affects users of ConnectWise Manage version 2017.5.
Yes, user input in the ContactCommon field can be exploited for cross-site scripting (XSS) attacks as per CVE-2017-11727.