cve/2021/CVE-2021-28247.md
2024-06-18 02:51:15 +02:00

18 lines
1.1 KiB
Markdown

### [CVE-2021-28247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28247)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
### POC
#### Reference
- https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
#### Github
No PoCs found on GitHub currently.