Description
|
|
Multiple vulnerabilities have been identified in Ipswitch WhatsUp, which could be exploited by attackers to disclose sensitive information or execute arbitrary scripting code.
The first issue is due to input validation errors in the "NmConsole/Navigation.asp", "NmConsole/ToolResults.asp", "NmConsole/Tools.asp", and "NmConsole/DeviceSelection.asp" scripts that do not validate certain parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to an access validation error in the "NmConsole/utility/RenderMap.asp" script, which could be exploited by attackers to disclose sensitive information (e.g. monitored devices) by manipulating the "nDeviceGroupID" variable.
The third flaw is due to input validation errors in the "NmConsole/DeviceSelection.asp" script that does not properly validate the "sRedirectUrl" and "sCancelURL" parameters, which could be exploited by attackers to redirect a user to malicious web sites.
The fourth issue is due to an error in the "NmConsole/Login.asp" script that responds differently depending on whether a user account exists, which could be exploited by remote attackers to enumerate valid usernames.
The fifth vulnerability is due to an error when handling an HTTP request containing a dot character appended to the end of file extensions, which could be exploited by attackers to disclose the source code of arbitrary ASP scripts.
The sixth issue is due to an error when displaying error messages (404), which could cause the full path to be disclosed.
|