First published: Sun Aug 29 2021(Updated: )
Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Log360 | <=5.1 | |
Zohocorp Manageengine Log360 | =5.2-build5200 | |
Zohocorp Manageengine Log360 | =5.2-build5201 | |
Zohocorp Manageengine Log360 | =5.2-build5206 | |
Zohocorp Manageengine Log360 | =5.2-build5209 | |
Zohocorp Manageengine Log360 | =5.2-build5210 | |
Zohocorp Manageengine Log360 | =5.2-build5211 | |
Zohocorp Manageengine Log360 | =5.2-build5213 | |
Zohocorp Manageengine Log360 | =5.2-build5214 | |
Zohocorp Manageengine Log360 | =5.2-build5218 | |
Zohocorp Manageengine Log360 | =5.2-build5219 | |
Zohocorp Manageengine Log360 | =5.2-build5220_beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40178 is a vulnerability in Zoho ManageEngine Log360 that allows stored XSS via the LOGO_PATH key value in the logon settings.
The severity of CVE-2021-40178 is medium with a CVSS score of 6.1.
CVE-2021-40178 affects Zoho ManageEngine Log360 versions 5.1 and 5.2-build5200 to 5.2-build5220_beta.
To fix CVE-2021-40178, update Zoho ManageEngine Log360 to Build 5224 or later.
You can find more information about CVE-2021-40178 in the Zoho ManageEngine Log360 release notes at https://www.manageengine.com/log-management/readme.html#Build%205224.