Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal Report Favorites

2015-03-21T00:00:00
ID SECURITYVULNS:DOC:31825
Type securityvulns
Reporter Securityvulns
Modified 2015-03-21T00:00:00

Description


Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal Report Favorites


Han Sahin, November 2014


Abstract

A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net) Web Portal. This issue allows attackers to replace the report that is shown at startup, the attackers payload will be stored in the user's profile and will be executed every time the victim logs in. The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, logging their keystrokes, or exploit issues in other areas of Watch4net.


Affected products

EMC reports that the following products are affected by this vulnerability:

  • EMC M&R (Watch4Net) versions prior 6.5u1
  • EMC ViPR SRM versions prior to 3.6.1

See also

  • CVE-2015-0513
  • ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities

Fix

EMC released the following updated versions that resolve this vulnerability:

  • EMC M&R (Watch4Net) 6.5u1
  • EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141102/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__web_portal_report_favorites.html