First published: Fri May 17 2019(Updated: )
An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in the Administration zone /netflow/jspui/scheduleConfig.jsp file via these GET parameters: devSrc, emailId, excWeekModify, filterFlag, getFilter, mailReport, mset, popup, rep_schedule, rep_Type, schDesc, schName, schSource, selectDeviceDone, task, val10, and val11.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Netflow Analyzer | =7.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-8927 is medium with a CVSS score of 6.1.
XSS exists in the Administration zone /netflow/jspui/scheduleConfig.jsp file via several GET parameters.
The affected software version of CVE-2019-8927 is Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2.
The CWE of CVE-2019-8927 is CWE-79 (Cross-Site Scripting).
You can find more information about CVE-2019-8927 at the following references: [Link 1](http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html), [Link 2](http://seclists.org/fulldisclosure/2019/Feb/45), [Link 3](https://www.exploit-db.com/exploits/46425/).