First published: Mon Aug 21 2017(Updated: )
Reflected and stored Cross-Site Scripting (XSS, CWE-79) vulnerabilities in Directory Server (aka Enterprise Server Administration web UI) and ESMAC (aka Enterprise Server Monitor and Control) in Micro Focus Enterprise Developer and Enterprise Server 2.3 and earlier, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allow remote authenticated attackers to bypass protection mechanisms (CWE-693) and other security features.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Directory Server | ||
Microfocus Enterprise Developer | =2.3 | |
Microfocus Enterprise Developer | =2.3-update1 | |
Microfocus Enterprise Developer | =2.3-update2 | |
Microfocus Enterprise Server | <=2.3 | |
Microfocus Enterprise Server | =2.3-update1 | |
Microfocus Enterprise Server | =2.3-update2 | |
Microfocus Enterprise Server Monitor And Control |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7421 is considered a medium severity vulnerability due to its potential for both reflected and stored Cross-Site Scripting (XSS) attacks.
To fix CVE-2017-7421, ensure that you apply the latest security updates from Micro Focus, specifically Hotfix 8 or later for the affected versions.
CVE-2017-7421 affects Micro Focus Directory Server, Enterprise Developer versions 2.3 and earlier, and Enterprise Server versions up to 2.3 Update 1 before Hotfix 8.
CVE-2017-7421 can facilitate reflected and stored Cross-Site Scripting (XSS) attacks, allowing attackers to execute arbitrary scripts in users' browsers.
Yes, CVE-2017-7421 is exploitable remotely since it involves vulnerabilities in the web UI of the affected Micro Focus products.