An XSS vulnerability allows remote attackers to execute arbitrary client side script on vulnerable installations of Sophos Cyberoam firewall devices with firmware through 10.6.4. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of a request to the "LiveConnectionDetail.jsp" application. GET parameters "applicationname" and "username" are improperly sanitized allowing an attacker to inject arbitrary JavaScript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the user. A vulnerable URI is /corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://seclists.org/bugtraq/2017/Jun/4 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-06-07T12:00:00
Updated: 2024-08-06T02:59:03.528Z
Reserved: 2016-12-05T00:00:00
Link: CVE-2016-9834
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-06-07T12:29:00.173
Modified: 2024-11-21T03:01:50.053
Link: CVE-2016-9834
Redhat
No data.