First published: Fri Mar 26 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA eHealth Performance Manager | <=6.3.2.12 | |
<=6.3.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28247 has a severity level that indicates it allows authenticated users to perform Cross Site Scripting, posing potential security risks.
To fix CVE-2021-28247, ensure you upgrade to a version of CA eHealth Performance Manager that is above 6.3.2.12.
Authenticated users of CA eHealth Performance Manager versions up to and including 6.3.2.12 are affected by CVE-2021-28247.
CVE-2021-28247 is classified as a Cross Site Scripting (XSS) vulnerability due to improper sanitization of user input.
Yes, CVE-2021-28247 can potentially lead to data breaches as it allows the injection of arbitrary web scripts that can manipulate user sessions.