First published: Mon May 18 2020(Updated: )
Cross Site scripting vulnerability on Micro Focus Enterprise Server and Enterprise developer, affecting all versions prior to version 5.0 Patch Update 8. The vulnerability could allow an attacker to trigger administrative actions when an administrator viewed malicious data left by the attacker (stored XSS) or followed a malicious link (reflected XSS).
Credit: security@microfocus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Enterprise Developer | =5.0 | |
Microfocus Enterprise Developer | =5.0-p1 | |
Microfocus Enterprise Developer | =5.0-p2 | |
Microfocus Enterprise Developer | =5.0-p3 | |
Microfocus Enterprise Developer | =5.0-p4 | |
Microfocus Enterprise Developer | =5.0-p5 | |
Microfocus Enterprise Developer | =5.0-p6 | |
Microfocus Enterprise Developer | =5.0-p7 | |
Microfocus Enterprise Server | =5.0 | |
Microfocus Enterprise Server | =5.0-p1 | |
Microfocus Enterprise Server | =5.0-p2 | |
Microfocus Enterprise Server | =5.0-p3 | |
Microfocus Enterprise Server | =5.0-p4 | |
Microfocus Enterprise Server | =5.0-p5 | |
Microfocus Enterprise Server | =5.0-p6 | |
Microfocus Enterprise Server | =5.0-p7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2020-9524.
Micro Focus Enterprise Server and Enterprise Developer versions prior to version 5.0 Patch Update 8 are affected.
This vulnerability allows an attacker to trigger administrative actions when an administrator views malicious data left by the attacker.
The severity rating of CVE-2020-9524 is medium, with a CVSS score of 5.4.
To fix this vulnerability, you should update Micro Focus Enterprise Server and Enterprise Developer to version 5.0 Patch Update 8 or later.