Missing input validation and output encoding allows JavaScript injection, leading to Reflected Cross Site Scripting (XSS).
Reflected Cross Site Scripting may be used to inject arbitrary JavaScript to the Microsoft System Center 2016 authenticated page. One may intercept the below GET request and modify the SpaceID to inject arbitrary strings into the left navigation pane of the web console.
GET/OperationsManager/InternalPages/NavigationTree.aspx?SpaceId=1002&ViewId=Favorites_Overview HTTP/1.1
Here is an example of an arbitrary string:
abc%3E%3C","00000000-0000-0000-0000-000000000000");alert(1);//%3E
A malicious JavaScript, once injected, can modify the current behavior of the page and deliver: trojans, force malicious redirections, content spoofing, keyloggers, content leakage, VIEWSTATE and validators’ tokens leakage (defeating anti-CSRF controls), etc.