These bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. The bug is located on the listing of the username & description result pages. The bug affect all result listings inside of the application and all username and description input fields. Another issues is located in the Domain Controller Name of the Directory Service & in the name, host + description of the department or snapshot configuration.
[+] Directory Service > Active Directory Import, Active Directory Deployment & AD Sync > Domain
Controller Server Name
[+] EndPoint Management > Users, Groups, Computers & Devices > Username, First Name, Last Name,
Department, Phone & E-mail
[+] System Maintance > System Snapshots > List Available Snapshots > Name & Description
[+] System Configuration > System Departments > Edit Department > Name & Description
Proof of Concept:
The persistent vulnerabilities can be exploited by remote attacker with low privileged user account or via medium or high required user inter action. For demonstration or reproduce ...