First published: Fri Sep 29 2017(Updated: )
A reflected Cross-Site Scripting(XSS) vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows for unintended information when a specific URL is sent to the system.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
HP Enterprise Security Manager | =6.0 | |
HP Enterprise Security Manager | =6.0c | |
HP Enterprise Security Manager | =6.5 | |
HP Enterprise Security Manager | =6.5-sp1 | |
HP Enterprise Security Manager | =6.5c | |
HP Enterprise Security Manager | =6.5c-sp1 | |
HP Enterprise Security Manager | =6.8 | |
HP Enterprise Security Manager | =6.8c | |
HP Enterprise Security Manager | =6.9.0c | |
HP Enterprise Security Manager | =6.9.1c | |
HP Enterprise Security Manager | =6.9.1c-p1 | |
HP Enterprise Security Manager | =6.9.1c-p2 | |
HP Enterprise Security Manager | =6.9.1c-p3 | |
HP Enterprise Security Manager | =6.11.0 | |
Hewlett Packard Enterprise Security Manager Express | =6.0 | |
Hewlett Packard Enterprise Security Manager Express | =6.0c | |
Hewlett Packard Enterprise Security Manager Express | =6.5 | |
Hewlett Packard Enterprise Security Manager Express | =6.5-sp1 | |
Hewlett Packard Enterprise Security Manager Express | =6.5c | |
Hewlett Packard Enterprise Security Manager Express | =6.5c-sp1 | |
Hewlett Packard Enterprise Security Manager Express | =6.8 | |
Hewlett Packard Enterprise Security Manager Express | =6.8c | |
Hewlett Packard Enterprise Security Manager Express | =6.9.0 | |
Hewlett Packard Enterprise Security Manager Express | =6.9.1c | |
Hewlett Packard Enterprise Security Manager Express | =6.9.1c-p1 | |
Hewlett Packard Enterprise Security Manager Express | =6.9.1c-p2 | |
Hewlett Packard Enterprise Security Manager Express | =6.9.1c-p3 | |
Hewlett Packard Enterprise Security Manager Express | =6.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13986 is classified as a reflected Cross-Site Scripting (XSS) vulnerability.
To mitigate CVE-2017-13986, upgrade to ArcSight ESM or ESM Express versions 6.9.1c Patch 4 or later, or 6.11.0 Patch 1.
An attacker can exploit CVE-2017-13986 to execute arbitrary JavaScript in the context of the affected application.
CVE-2017-13986 affects ArcSight ESM and ESM Express versions 6.x prior to 6.9.1c Patch 4 and 6.11.0 Patch 1.
Yes, for CVE-2017-13986 to be exploited, the user must click on a specially crafted URL.