EMC Network Configuration Manager (NCM) is affected by a reflected cross site scripting Vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions 9.3.x, 9.4.0.x, 9.4.1.x, and 9.4.2.x are affected.
72e876fa3de6241e4d169bba2325e32585cdd5d35098bfcdf2df6e97035af71d
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
ESA-2017-112: EMC Network Configuration Manager Reflected Cross-Site Scripting Vulnerability
EMC Identifier: ESA-2017-112
CVE Identifier: CVE-2017-8017
Severity Rating: CVSSv3 Base Score: 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
Affected products:
* EMC Network Configuration Manager (NCM) 9.3.x
* EMC Network Configuration Manager (NCM) 9.4.0.x
* EMC Network Configuration Manager (NCM) 9.4.1.x
* EMC Network Configuration Manager (NCM) 9.4.2.x
Summary:
EMC Network Configuration Manager (NCM) is affected by a reflected cross-site scripting Vulnerability that could potentially be exploited by malicious users to compromise the affected system.
Details:
The Report Advisor component in EMC Network Configuration Manager (NCM) is affected by a reflected cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary HTML in the user's browser session in the context of the affected application.
Resolution:
The following EMC Network Configuration Manager release contains resolution to this vulnerability:
* EMC Network Configuration Manager version 9.5
EMC recommends all customers upgrade at the earliest opportunity.
Link to remedies:
https://support.emc.com/products/31946_Service-Assurance-Suite
Credit:
EMC would like to thank Lukasz Plonka for reporting this issue.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJZ1mSSAAoJEHbcu+fsE81Zul4H/0rz/w9V+zWyjUowYuYgKWOd
c03fYbO6BEdJ/HZ05eblXDnNtp3HC6B+Z0PH8PlapfIxvGLezRvb2oidyy/BoNdc
TMlVsSb9hJWEMykRMWsyT94C/wqzp3Cjm5qi8jFSdzMjfCqbaaAWCpgyg6F1VMCy
vc6SAGHL9qfBqzQ1f2WR6sZMsG16qu9VgsmLciYPCGhfmqBMiWgdhcOf3cS+aDOO
6FX2ZrDuumxfFaWoS9+pG5Nz65RHTVljn6t3Xo+NhfQDS/bVbWjv8m/Jd8M0dwuL
cAZsM2ukWP8DVDX0xFd0CTioPS9s2DyvThacPF1rCn7Q5qC0OgV6cAqcNgRPfsM=
=QUiL
-----END PGP SIGNATURE-----